text
stringlengths
176
646k
id
stringlengths
47
47
dump
stringclasses
8 values
url
stringlengths
14
2.25k
file_path
stringlengths
125
141
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
236k
score
float64
2.52
5.13
int_score
int64
3
5
Sports Psychology Resources for Children and Parents Would like to learn more how Sports Psychology for Children works? Feel free to take a look at our resources below. Sports Psychology for Children and Parents Below are a range of popular questions we get asked by parents and coaches when discussing children’s sport performance and enjoyment of sport. You’ll also find some additional resources too, which should be of help to you. How does Sports Psychology for children work? Sports psychology sessions with children typically do not last as long as adults. 45 minutes is likely to be the maximum time frame for a session with a child who is aged between 9 and 16 years old. It is not uncommon to do 30 minute online sessions via Skype, Zoom, WhatsApp or Facetime. We do not support children under the age of 9 years old. Sessions for children, especially younger children, are likely to be quite active sessions where we may discuss challenges whilst kicking a football on a pitch, hitting a golf ball on a range or bowling a cricket ball. This is because of their concentration skills as well as our intention to help children have fun when playing their sport so that they go on to play with freedom. Are parents involved in the Sports Psychology sessions? In the Sports Psychology sessions we like to involve parents in some way. We agree with your child the best way for it to happen. Some children may prefer that you sit in the session and contribute – if that helps them open up and feel more relaxed, this approach is fine. Other children are more comfortable with their parents out of the way. In this case, we’d spend 10-15 minutes at the end of the session discussing what we had covered in the session as a team with the parent(s). On occasions, we work solely with the parents so that they can reflect on their behaviours and work with their child or children differently. We also have a range of resources that parents can take away to improve their knowledge of sports psychology and what to do or what not do around their children before, during and after competitive events and training sessions. What are common challenges that you help children with? Sports psychology covers a wide range of areas from developing mental toughness to improving confidence and communication skills. Mental health prevention, dealing with injuries and skill acquisition are other areas. However, to make things easier for you, below is a list of our top 10 common challenges that we help children with. - Dealing with criticism from coaches and teammates - Being too hard on themselves during a match or competitive event - Hiding in the background and not expressing themselves fully - Lack of enjoyment or thoughts of quitting sport - Poor body language - Troubles communicating with other people - Catasphrophising about their form or their future (eg. In academy’s a lot of pressure is put on children which can impact on their confidence levels) - Worrying too much about what other people think - Loss of skills (eg. An inability to transfer practise and training to competitive events or lost move syndrome in gymnastics) - Being too nervous before competing Demystifying Mental Toughness Podcast Demystifying Mental Toughness is a podcast for people who want to reach their goals faster and are curious what high performing athletes and professionals do to fulfil their potential. If you’re a motivated athlete, coach, sport psychologist, mental game coach or executive listen in for proven and practical advice in this podcast. How do I know if Sports Psychology coaching will work for my child? 1-2-1 sports psychology coaching can be a very effective method to improve children’s enjoyment and sport performance levels whilst making lasting changes to their overall mindset and providing valuable life skills. We are very lucky to have had a lot of success in this department in the last 10 years. However, that said, we cannot guarantee results in every case. Each individual’s results do vary as every situation is different. Being motivated and open-minded are 2 keys to sports psychology tools working well. Can Sports Psychology coaching help my child enjoy their sport more? Most parents face this challenge from time to time and can struggle encouraging their children in sports. At some point it’s pretty inevitable that something happens and your child or children don’t want to go to train or compete. So how, as parents, can we help them get over that? One helpful thing is to understand why. Have they burnt out and done too much? Is it lack of motivation? Is it that their interests have changed? Or are their coach or you, as parents, putting them under too much pressure? Once you have worked out the cause then you’ll be better placed to find a solution. Sometimes the best and only solution, though very difficult for parents, is for the child to walk away from the sport for a short time or for good. Below are 2 quizzes that parents have found find very helpful in finding the cause of their child’s unhappiness. If you ask your child or children to take the quiz and you also take the parental quiz (without comparing notes). Then go on to discuss both results. It should open up a nice conversation and help you get a better feel for why your child chooses to play sport and where things have gone off course. Click on the links below to find out more:
<urn:uuid:a8f67621-8bac-45cf-a927-823de31da264>
CC-MAIN-2022-33
https://www.sport-excellence.co.uk/sport-psychology-for-children-and-parents/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570730.59/warc/CC-MAIN-20220807211157-20220808001157-00288.warc.gz
en
0.963753
1,103
2.65625
3
A cavity, also commonly referred to as tooth decay, is a common dental problem impacting millions of Americans each year. If left untreated, this issue could result in pain, difficulties chewing, tooth loss, and other potentially serious complications. How Are Cavities Formed? American Dental, a practice of dentists in Lincoln Park stresses to our followers and loyal patients that cavities are spaces or crevices that develop over several stages. During the first phase, teeth are exposed to excessively sugary foods. These products stimulate the growth of tooth-demanding bacteria. These pathogens produce acid. As the second phase of cavity formation commences, teeth are exposed to high acid concentrations. Once the third phase begins, acid and bacteria combine to penetrate a tooth component known as dentin. This is the bony portion comprising the vast majority of a tooth’s mass. This event progresses to pulp penetration. Pulp is an inner, softer tooth component. Once cavities enter this deeper region, they often become symptomatic and could result in complications like infections. In the early stages, our patients often do not experience any symptoms. However, as the disease process progresses, they may encounter occurrences such as: - Sensitivity to excessively cold or hot foods or beverages - Discernible holes or other visible tooth damage - Tooth discoloration - Discomfort worsens when one chews or speaks When cavities grow exceptionally pronounced, bacterial accumulation could result in potentially serious ailments like dental abscesses. Possible Treatment Options The treatment we offer patients will vary depending upon the size of the cavity, its location, the patient’s general health, and if any other complications exist. That said, common treatment options include: Early-stage cavities often benefit from fluoride application. Fluoride is a powerful element noted for its ability to strengthen and potentially restore lost tooth enamel. More advanced tooth decay may require the insertion of dental equipment known as crowns. These objects are manmade materials designed to appear similar to a tooth’s natural crown. Typically, crowns are built out of durable materials such as: - Composite resins Before crown insertion, the operating dental provider will remove as much of the diseased tooth as possible to prevent complications and ensure the device fits well. Usually, fillings, which are also called restorations by industry professionals, are the most commonly employed treatment for moderate to more progressive decay. These items can be made out of a variety of materials. In more severe progressions, we perform root canals. During this procedure, a damaged or diseased portion of a patient’s tooth is removed, the interior region is thoroughly cleaned, and the open space is replaced with some type of filling material. When teeth are too diseased to be treated, extraction might be indicated. The gap left by a pulled tooth could be replaced using a bridge or dental implant. Reaching Out To Us We employ some of the finest dentists in Chicago who are not only skilled, experienced, and professional but are deeply committed to our community and patients. Additional information about us can be accessed by visiting our website.
<urn:uuid:fdb47e15-f6bf-4cf7-9a14-1cf3e06165d0>
CC-MAIN-2022-33
https://atooth.com/how-are-cavities-formed-and-what-are-your-treatment-options/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00288.warc.gz
en
0.93848
689
3.25
3
Indigenous Borneans knew a tree was two distinct species. Genetic analysis confirms they were right. More than 200 years ago, a Spanish botanist described Artocarpus odoratissimus, a species of fruit-bearing tree found in Borneo and the Philippines. The Iban people, who are indigenous to Borneo, know the tree to have two different varieties, which they call lumok and pingan, distinguished by their fruit size and shape. Despite this knowledge, Western botanists have long considered the tree as a single species, but a genetic analysis, published in the journal Current Biology and supported by the U.S. National Science Foundation, confirms that the Iban people were right all along. "This study benefitted from invaluable and irreplaceable indigenous knowledge," says Christopher Schneider, a program director in NSF's Division of Environmental Biology. "Too few past studies have acknowledged similar contributions. This team's inclusive approach is laudable." To determine the correct taxonomy of the tree, which is in the same genus as the trees that produce the meaty jackfruit, scientists took DNA samples from trees in Malaysian Borneo and from historical herbarium specimens. They employed phylogenetic analyses and DNA microsatellites to show that while lumok and pingan are closely related, they are genetically distinct species. The scientists recommend the trees be renamed to reflect this result, and suggest that it's time to consider incorporating Indigenous names into taxonomic research. "While the scientific endeavor has long benefitted from Indigenous knowledge, it has usually not engaged with it on equal footing," write the authors, which include Malaysian scientists and Iban field botanists, led by Elliot Gardner, a botanist at Florida International University. "While Linnaean taxonomy offers a broad framework for global comparisons, it may lack the detailed local insights possessed by Indigenous peoples." "Time is of the essence," say Gardner and colleagues, "because just as biodiversity is under threat from climate change, Indigenous knowledge is threatened by societal change."
<urn:uuid:acd6fdb8-9e49-451d-abaa-5c3cb9dca645>
CC-MAIN-2022-33
https://beta.nsf.gov/news/indigenous-borneans-knew-tree-was-two-distinct-species-genetic-analysis-confirms-they-were
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00288.warc.gz
en
0.960241
421
3.859375
4
Room 3-B3-SR01, Rontgen It is widely believed that female students benefit from being taught by female teachers, particularly in situations in which female teachers serve as counter-stereotypical role models. We study education in rural areas of the US circa 1940—a context in there were few professional female exemplars other than teachers—and find that female students were more successful when their primary-school teachers were disproportionately female. Impacts are lifelong: female students taught by female teachers were more likely to move up the educational ladder—more likely to complete high school and attend college—and had higher lifetime family income and increased longevity. Seth G. Sanders is the Ronald Ehrenberg Professor of Economics at Cornell University. Prior to joining the faculty at Cornell, he was Professor of Economics and Public Policy at Duke University and Director of the Duke Population Research Institute. His scholarly work has covered a range of topics in labor economics and economic demography including aging and cognition, race and gender gaps in earnings among the highly educated, the effects of extreme economic changes on workers and families, the performance of gay and lesbian families in the economy, and the economic consequences of teenage childbearing. He was the research director of the first census research data center at Carnegie Mellon University and has worked with restricted use census data throughout his career.
<urn:uuid:04b60531-ed46-405e-bfbf-d70563a067a2>
CC-MAIN-2022-33
https://dondena.unibocconi.eu/seth-sanders
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00288.warc.gz
en
0.984536
276
3.046875
3
In this procedure, a surgeon removes a piece of the skull to access the brain in order to treat conditions such as brain lesions and brain tumors , according to Johns Hopkins Medicine. The piece of skull is replaced as soon as possible. Occasionally, people will practice trepanation on themselves for various reasons. What type of surgery is craniotomy? A craniotomy is the surgical removal of part of the bone from the skull to expose the brain. Specialized tools are used to remove the section of bone called the bone flap. The bone flap is temporarily removed, then replaced after the brain surgery has been done. Is trepanation a lobotomy? Lobotomy is another surgical treatment that involves drilling a hole in a person’s skull. Unlike trepanation, however, the aim of lobotomy is to sever nerve fibers in the brain that connect the frontal lobe—the area of the brain responsible for thinking—with other brain regions. What replaced lobotomies? By the mid-1950s, scientists had developed psychotherapeutic medications such as the antipsychotic chlorpromazine, which was much more effective and safer for treating mental disorders than lobotomy. Nowadays, mental illness is primarily treated with drugs and psychotherapies. Is frontal lobotomy still used today? Today lobotomy is rarely performed; however, shock therapy and psychosurgery (the surgical removal of specific regions of the brain) occasionally are used to treat patients whose symptoms have resisted all other treatments. How many types of craniotomy are there? Figure 1. Craniotomies are often named for the bone being removed. Some common craniotomies include frontotemporal, parietal, temporal, and suboccipital. Craniotomies vary in size and complexity. Is a craniotomy a high risk surgery? Like any other type of brain cancer surgery, a craniotomy has several risks. These include: Bleeding. Infection. How long does it take to fully recover from a craniotomy? It can take 4 to 8 weeks to recover from surgery. Your cuts (incisions) may be sore for about 5 days after surgery. Your scalp may swell with fluid. You may also have numbness and shooting pains near your wound. What is trepanation and why is it significant? Trepanning is a process whereby a hole is drilled in the skull, and, with evidence going back to prehistoric times, it is one of the oldest surgical practices in history. The earliest trepanned skull was discovered at a Neolithic burial site in France, and is more than 7,000 years old. What are the complications of trepanation? The main complications that may arise from trephination include brain injury, hemorrhage, and infection (Ortner, 2003). It is noteworthy that although trephinations require great precision, success rates have been particularly high from prehistoric to modern times (Arnott et al., 2003; Moghaddam et al., 2015). What do you mean by Trephination? : an act or instance of perforating the skull with a surgical instrument. Why was trepanation used in prehistoric times? Trepanations appear to have been most common in areas where weapons that could produce skull fractures were used. The primary theories for the practice of trepanation in ancient times include spiritual purposes and treatment for epilepsy, headache, head wound, and mental disorders. What is a brain surgeon called? A neurosurgeon is a physician who specializes in the diagnosis and surgical treatment of disorders of the central and peripheral nervous system including congenital anomalies, trauma, tumors, vascular disorders, infections of the brain or spine, stroke, or degenerative diseases of the spine. Can you fully recover from a brain tumor? Some people may complete recovery in a few weeks or months, others will have to learn to adjust to permanent changes in their life such as not being able to work or accomplish all the same tasks they did before. Can you survive a craniotomy? With good long-term treatment and rehabilitation, you may be able to fully recover with almost no complications and continue your daily life. A craniectomy can save your life after a brain injury or stroke if it’s done quickly enough to prevent damage caused by bleeding or swelling in your brain. Does skull grow back after craniotomy? After a few weeks to months, you may have a follow-up surgery called a cranioplasty. During a cranioplasty, the missing piece of skull will be replaced with your original bone, a metal plate, or a synthetic material. For some craniotomy procedures, doctors use MRI or CT scans. What is the success rate for craniotomy? Survival: Infratentorial Craniotomy The 30- and 180-day survival rates for infratentorial craniotomy were 100% and 96%, respectively, for 2020. What’s the difference between craniotomy and craniectomy? craniectomy: surgical removal of a portion of the skull. craniotome: a special saw with a footplate that allows cutting of the skull without cutting the dura mater. craniotomy: surgical opening of a portion of the skull to gain access to the intracranial structures and replacement of the bone flap. How big is a burr hole? Burr holes are small holes (the size of a dime) that a neurosurgeon makes in the skull. Burr holes can be used to relieve pressure on the brain when fluid, such as blood, builds up and starts to compress brain tissue. What is a supratentorial craniotomy? Supratentorial craniotomy means the exposure of any part of a cerebral hemisphere over the basal line joining the nasion to the inion. Were any lobotomies successful? According to estimates in Freeman’s records, about a third of the lobotomies were considered successful. One of those was performed on Ann Krubsack, who is now in her 70s. “Dr. Freeman helped me when the electric shock treatments, the medicine and the insulin shot treatments didn’t work,” she said. Did any lobotomies actually work? Surprisingly, yes. The modern lobotomy originated in the 1930s, when doctors realized that by severing fiber tracts connected to the frontal lobe, they could help patients overcome certain psychiatric problems, such as intractable depression and anxiety. What is someone like after a lobotomy? Freeman believed that cutting certain nerves in the brain could eliminate excess emotion and stabilize a personality. Indeed, many people who received the transorbital lobotomy seemed to lose their ability to feel intense emotions, appearing childlike and less prone to worry.
<urn:uuid:bd9ab41b-aacf-46a2-8640-ac121fcdedae>
CC-MAIN-2022-33
https://www.allwhitebackground.com/is-craniotomy-the-same-as-trepanation/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00288.warc.gz
en
0.944304
1,418
3.296875
3
Cognitive Artificial Intelligence The Beyond Limits hybrid of conventional numeric AI (machine learning, neural networks, and deep learning) plus advanced symbolic AI techniques enable our systems to analyze, reason, hypothesize, correlate, plan, learn, and teach. The system produces clear advice weighed according to human expert knowledge and best practices. On top of comprehending vast amounts of data, our solutions bring situational awareness plus human-like reasoning to diagnosing issues, prognosticating problems, and suggesting remedies. In contrast to conventional AI approaches, Beyond Limits cognitive AI solutions are always “explainable”. Our cognitive engines deliver transparent audit trails explaining the reasoning behind their recommendations and showing the evidence, risk, confidence, and uncertainty. These audit trails are designed to be understood by people and interpretable by machines. We build cognitive systems that think like experts and produce operational efficiencies at scale that equate to new revenue and increased profits. We have a new term for this new form of ROI generated by AI: “RAI” or Revenue from AI. AI applications involving high-value assets require human-like understanding of complex domains that can adapt to uncertainty in both knowledge and data, supporting answers with human-understandable audit trials. This requires the integration of different learning and adaptation techniques to overcome limitations of individual technologies and achieve synergetic effects through hybridization of symbolic and numeric technologies. The key to cognitive AI is to build an initial set of models and propose hypothetical extensions. Beyond Limits cognitive AI systems have the unique capability to look for guidance from encoded human expert knowledge combined with historical and external data. We can therefore model hypothetical paths to predict the future and propose courses of action to make smart decisions, even under less-than-ideal data conditions. This approach has been essential to NASA’s exploration of the unknown in space and has great power to solve problems for industries on earth.
<urn:uuid:39997744-133c-4483-840b-0ad2fa2dab0d>
CC-MAIN-2022-33
https://www.beyond.ai/technology/cognitive-ai/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00288.warc.gz
en
0.910942
386
2.65625
3
The devastating impact of extreme weather is etched into our collective memory. In 2021 alone, the world saw record-shattering heat in western North America, deadly floods in Europe, China and west Africa, and wildfires in the Mediterranean. But alongside these events happening on land, the oceans experience extreme conditions too. In 2015, the North Pacific saw the largest marine heatwave ever recorded, known simply as the “Blob”. As Earth warms, marine heatwaves are likely to become more intense, happen more often and last longer. But as our recent paper in Nature explains, we are also set to see more occasions – as with the “Blob” – where two or more types of extreme events occur simultaneously. The ‘Blob’ in the Pacific In 2015-16, much of the tropical Pacific was experiencing record high sea surface temperatures associated with a strong El Niño event, causing widespread bleaching and death of coral reefs. At the same time, the North Pacific was seeing extreme warmth, in an event that became known as the “Blob”. At its peak in 2015, the Blob covered about 4m square kilometres (km2) of ocean, stretching from Alaska to Baja California. The Blob had huge consequences for marine ecosystems, causing a drop in primary production – the process by which marine plants produce food to live and grow – and forcing fish and other organisms to move in search of cooler habitats. Extended blooms of harmful algae also had devastating effects on mussel and crab fisheries, which, in turn, led to massive die-offs of seabirds, seals and sea lions. Unsurprisingly, the Blob caught the headlines at the time. National Geographic, for example, described it as, “The blob that cooked the Pacific”. Some of the ecological consequences of the Blob are still lingering today, with several marine animal populations not having fully recovered. A ‘triple-compound’ extreme event Our research used simulations from a regional ocean biogeochemical model to explore not only the extreme heat that characterised the Blob, but also whether the upper water column in the northeast Pacific at the time was unusual in other ways too. In particular, with respect to its oxygen levels and acidity (measured by the pH of the seawater). When two or more types of extreme events occur together – over land or in the ocean – it is known as a “compound” event. Dual-compound (two types) or even triple-compound (three types) events are adding new and largely unquantified stress to marine ecosystems. Our research set out to examine if the Blob in the North Pacific in 2013-15 was a compound extreme event, which could potentially explain part of the devastating effects on marine life. The figure below shows a timeseries for the part of the northeast Pacific where the Blob occurred. Light orange shading denotes when a marine heatwave occurred (a single event). Dark orange and purple denote dual-compound events involving a marine heatwave and either low oxygen or extremely low pH, respectively. Grey signifies times when all three types of extreme occurred simultaneously. The chart shows grey shading for several months in 2015 in the northeast Pacific. This indicates that the heatwave coincided with extremes in acidity and oxygen, making at least part of the Blob a triple-compound event. The chart also shows several dual extremes (dark orange and purple) prior to the peak in 2015, making the Blob period from 2013 until 2015 highly unusual in the record extending back to the 1980s. The triple-compound event covered a large area of ocean, as shown by the grey areas in the map on the left-hand side below. The darker the grey, the deeper the extreme conditions penetrated the ocean. The map shows how the triple-compound extreme event extended in a big arc from the coast of southwestern Canada out to the open ocean, covering in total nearly 0.2m km2. The accompanying chart shows that the event extended down to 70 metres and more of the ocean. It is not unreasonable, given the scale and extent of the Blob, to expect that some of the observed consequences for marine ecosystems could be the result of the concurrent extremes in ocean acidity and low oxygen amplifying the effects of the long-lasting heatwave. A future with more extremes As part of our research, we carried out a global model analysis of extremes in ocean temperature, acidity and oxygen, which allowed us to put the results from the Blob into a global perspective. Extreme events in the ocean are a global phenomenon, although there are hotspots where the strongest extremes occur. At the surface, the most severe extremes occur in the eastern tropical Pacific and in the mid-to-high latitudes. Deeper in the ocean, the strongest events occur mostly at low latitudes. Our results show that between pre-industrial times and the present, marine heatwaves have become 10 times more common and low oxygen extremes have become about five times more common. Ocean acidity extremes have become essentially near permanent, meaning they have increased nearly 100-fold. These striking increases are a direct consequence of the upward trends in ocean warming, oxygen depletion – known as “deoxygenation” – and ocean acidification, which themselves are caused primarily by emissions of CO2 into the atmosphere. We can, therefore, say with high confidence that the increase in marine heatwaves and ocean acidification extremes are primarily caused by human activities. Looking ahead, this implies that all three types of extreme events will increase as long as atmospheric CO2 and Earth’s temperature keep increasing. This also suggests that compound events – where two or more extremes occur simultaneously – are much more likely to occur in future too. This matters because these extreme events are adding substantial new stresses to marine organisms and ecosystems that could appear a long time before the slower-evolving trends in ocean warming, ocean acidification and ocean deoxygenation. The speed of onset of an extreme event or their recurrence rate can overwhelm the mechanisms available to organisms to cope with extreme conditions, for example. Addressing the threat: In three main ways Despite the potentially harmful consequences for marine organisms and ecosystems from compound extreme events, they remain poorly understood. It is our view that we vastly need to ramp up research in three key areas. The first issue is the criteria for classifying conditions as “extreme”. In our article, we adopted a relative threshold approach, which defines extreme days as those when the property of interest exceeds the 99th percentile (in the case of temperature and acidification) or lies below the 1st percentile (in the case of oxygen) of the long-term seasonal average. While this is the most commonly used approach in extreme event research, it may overestimate the effect of extremes on marine organisms that are able to adapt quickly. A fundamentally different approach involves absolute thresholds, such as the minimum oxygen concentration to sustain metabolism or the point at which seawater is so acidified as to become corrosive. Such criteria need to be chosen with a particular impact in mind. Secondly, direct observations of extreme conditions below the surface of the ocean are still very limited. Fortunately, these are rapidly improving thanks to recent developments such as Biogeochemical Argo – a deployment of fleets of autonomous profiling floats that monitor the ocean in real time. Looking at the ocean’s interior is critical since the majority of marine organisms live across several hundred metres. The third and biggest challenge is our very limited understanding of how extremes affect organisms and ecosystems. In particular, very little is known about the effect of dual- or triple-compound events. In our paper, we outline different processes that need to be better understood – at the level of a cell all the way up to those governing ecosystem structure and function. For example, the expression of heat shock proteins helps to stabilise essential physiological functions during individual extremes, and ecosystems may adapt to an increased frequency of extremes through shifts in their species composition in favour of less vulnerable species. Better understanding of marine extremes – especially with respect to their impact on marine organisms and ecosystems – will help to design strategies to cope with the consequences. This could include, for example, the temporary closure of fishing grounds in order to reduce the other stressors on the system. This effort will also help to improve our understanding of the impact of the slower-evolving processes of ocean warming, ocean deoxygenation and ocean acidification, as the conditions encountered during extremes today are anticipated to become the norm a few decades from now. Gruber, N. et al. (2021) Biogeochemical extremes and compound events in the ocean, Nature, doi: 10.1038/s41586-021-03981-7 Prof Boyd dedicates this article on marine extremes to the legacy of Dr Rebecca Harris, director of the Climate Futures Team at the University of Tasmania, and her pivotal research into the ramifications of extremes on the terrestrial biosphere.
<urn:uuid:64e1df7e-9fb5-40f8-807a-11c27d44e112>
CC-MAIN-2022-33
https://www.carbonbrief.org/guest-post-why-oceans-could-face-more-extremes-like-the-pacific-blob/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00288.warc.gz
en
0.942687
1,868
4.375
4
(ACR-2: dp. 8,150; l. 384'; b. 64'10"; dr. 23'3"; s. 21 k.; a. 6 8", 12 4", 8 6", 4 1-pdrs., 3 14- tt.) New York, the 11th of the original 13 states, ratified the Constitution 26 July 1788. The fourth New York, an armored cruiser authorized by Congress in 1888, was laid down 19 September 1890 by William Cramp and Sons, Philadelphia; launched 2 December 1891; sponsored by Miss Helen Page; and commissioned at Philadelphia 1 August 1893, Capt. John Philip in command. Assigned to the South Atlantic Squadron, New York departed New York Harbor 27 December 1893 for Rio de Janeiro; arriving Taipu Beach in January 1894, she remained there until heading home 23 March, via Nicaragua and the West Indies. Transferred to the North Atlantic Squadron in August, the cruiser returned to West Indian waters for winter exercises and was commended for her aid during a fire that threatened to destroy Port of Spain, Trinidad. Returning to New York, the cruiser joined the European Squadron in 1895 and steamed to Kiel, where she represented the United States at the opening of the Kiel Canal. Rejoining the North Atlantic Squadron, New York operated off Fort Monroe, Charleston, and New York through 1897. New York departed Fort Monroe 17 January 1898 for Key West. After the declaration of war in April, New York steamed to Cuba and bombarded the defenses at Matanzas before joining other American ships at San Juan in May, seeking the Spanish squadron. Not finding it, they bombarded fortifications at San Juan before withdrawing. New York then became flagship of Admiral Sampson's squadron as the American commander planned the campaign against Santiago; the battle, 3 July, resulted in complete destruction of the Spanish fleet. The cruiser sailed for New York 14 August to receive a warrior's welcome. For the next year she cruised with various State naval militias to Cuba, Bermuda, Honduras, and Venezuela and conducted summer tactical operations off New England. On 17 October 1899, she departed New York for Central and South American trouble areas. New York transferred to the Asiatic Fleet in 1901, sailing via Gibraltar, Port Said, and Singapore to Cavite, where she became flagship of the Asiatic Fleet. She steamed to Yokohama in July for the unveiling of the memorial to the Perry expedition. In October New York visited Samar and other Philippine islands as part of the campaign against insurgents. On 13 March 1902, she got underway for Hong Kong and other Chinese ports. In September, she visited Vladivostok, Russia, then stopped at Korea before returning to San Francisco in November. In 1903, New York transferred to the Pacific Squadron and cruised with it to Ampala, Honduras in February to protect American interests during turbulence there. Steaming via Magdalena Bay, the cruiser returned to San Francisco, for a reception for President Roosevelt. In 1904, New York joined squadron cruises off Panama and Peru, then reported to Puget Sound in June where she became flagship of the Pacific Squadron. In September, she enforced the President's neutrality order during the Russo-Japanese war. New York was at Valparaiso, Chile from 21 December 1904 to 4 January 1905, then sailed to Boston and decommissioned 31 March for modernization. Recommissioning 15 May 1909, New York departed Boston 25 June for Algiers and Naples where she joined the Armored Cruiser Squadron 10 July and sailed with it for home on the 23d. Operating out of Atlantic and gulf ports for the next year, she went into fleet reserve, 31 December. In full commission again 1 April 1910, New York steamed via Gibraltar, Port Said, and Singapore to join the Asiatic Fleet at Manila 6 August. While stationed in Asiatic waters, she cruised among the Philippine Islands, and ports in China and Japan. She was renamed Saratoga 16 February 1911. The cruiser spent the next 5 years in the Far East. Steaming to Bremerton, Wash. 6 February 1916, Saratoga went into reduced commission with the Pacific reserve fleet. As the United States drew closer to participation in World War I, Saratoga commissioned in full 23 April 1917, and joined the Pacific Patrol Force 7 June. In September, Saratoga steamed to Mexico to counter enemy activity in the troubled country. At Ensenada, Saratoga intercepted and helped to capture a merchantman transporting 32 German agents and several Americans seeking to avoid the draft law. In November, she transited the Panama Canal joining the Cruiser Force, Atlantic Fleet at Hampton Roads. Here she was renamed Rochester, 1 December 1917. After escorting a convoy to France, Rochester commenced target and defense instruction of armed guard crews, in Chesapeake Bay. In March 1918, she resumed escorting convoys and continued the duty through the end of the war. On her third trip, with convoy HM-58, a U-boat torpedoed British steamer Atlantian 9 June. Rochester sped to her aid; but Atlantian sank within 5 min. Other ships closed in, but the sub was not seen again. After the Armistice, Rochester served as a transport bringing troops back home. In May 1919, she served as flagship of the destroyer squadron guarding the transatlantic flight of the Navy's NC seaplanes. In the early 1920's she operated along the east coast. Early in 1923, Rochester got underway for Guantanamo Bay to begin another period of service off the coasts of Central and South America. In the summer of 1925, Rochester carried General Pershing and other members of his commission to Arica, Chile to arbitrate the Tacna-Arica dispute and remained there for the rest of the year. In September 1926 she helped bring peace to turbulent Nicaragua and from time to time returned there in the late 1920's. After a quiet 1927, Rochester relieved Tulsa at Corinto, Nicaragua in 1928 as Expeditionary Forces directed efforts against bandits in the area. Disturbances boiled over in Haiti in 1929, and opposition to the government was strong; inasmuch as American lives were endangered, Rochester transported the 1st Marine Brigade to Port-au-Prince and Cap Haitien. In 1930, Rochester transported the 5-man commission sent to investigate the situation. In March, she returned to the area to embark marines and transported them to the United States. She aided Continental Oil tanker H. W. Bruce, damaged in a collision 24 May. In 1931, an earthquake rocked Nicaragua. Rochester was the first relief ship to arrive on the scene and ferried refugees from the area. Bandits took advantage of the chaotic conditions and Rochester steamed to the area to counter their activities. Rochester departed Balboa 25 February 1932 for service in the Pacific Fleet. She arrived Shanghai 27 April, to join the fleet in the Yangtze River in June and remained there until steaming to Cavite, to decommission 29 April 1933. She moored at the Olongapo Shipyard for the next 8 years. Her name was struck from the Navy Register 28 October 1938, and she was scuttled in December 1941 to prevent her capture by the Japanese.
<urn:uuid:fbd22835-eb4e-4823-bccd-8ae7a748c776>
CC-MAIN-2022-33
https://www.history.navy.mil/research/histories/ship-histories/danfs/n/new-york-iv.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00288.warc.gz
en
0.960574
1,492
3.015625
3
Use of renewable energy sources is one solution to decrease green house gas emissions and the use of polluting fossil fuels. Renewables differ in their environmental and societal impacts, and to design sound renewable energy policy, societies need to assess the trade-offs between alternative sources. To enable the evaluation and comparison of renewable energy production alternatives in Finland, this paper applies the choice experiment to elicit the monetary information on people's preferences for four renewable energy sources: wind power, hydro power and energy from crops and wood, and considers four impacts of energy production: effects on biodiversity, local jobs, carbon emissions and household's electricity bill. The nested logit analysis reveals that higher income, male gender, young age, and pro-environmental attitude increase the probability to choose renewable energy instead of the current energy mix. Wind power is, on average, the most popular renewable energy technology, but regional differences exist. Biodiversity deterioration should be avoided. The national aggregate willingness to pay, based on stated preferences rather than preferences revealed by actual market behavior, for a combination of renewable energy technologies that corresponds to Finland's climate change and energy policy is over 500 million Euros.
<urn:uuid:9ba991b8-00e1-4dda-8596-6a9ecbf97c83>
CC-MAIN-2022-33
https://www.researchgate.net/publication/268518026_Environmental_and_societal_trade-offs_of_renewable_energy_sources
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00288.warc.gz
en
0.890193
229
3.171875
3
As well as these statistics, the report provides data on the industries in which these incidents occur, causation factors, and other demographic information like the age and gender of the workers involved. These data sets paint a comprehensive picture of the work-related traumatic injury fatalities in Australia. Here are some of the key findings and statistics: Total fatalities and fatality rate The report’s most notable finding is that worker fatalities increased, with 183 worker fatalities in 2019 due to injuries sustained during a work-related activity. Safe Work Australia began compiling this information in 2003, and the number of deaths peaked four years later, with 310 fatalities recorded in 2007. After this point, fatalities and the fatality rate began to decline. The fatality rate refers to the number of fatalities per 100,000 workers. The 2019 fatality rate was 1.4, up by 0.3 from 2018. This figure shows an increase from 1.1 (fatalities /100 000 workers) in 2018 and a significant drop (62%) since the 2007 peak of 3.0 deaths per 100 000 workers recorded. Of the 183 total worker fatalities in 2019, 6 were female, and 177 were male. Safe Work Australia identified some industries as priority areas. These are industries with high numbers and rates of fatalities and injuries or involve hazardous work. Some of the listed sectors (such as Manufacturing, Accommodation and Food Services, Health Care and Social Assistance, and Public Administration and Safety) have low fatality rates but high non-fatal injury rates. Accordingly, the priority industries are as follows: - Transport, Postal and Warehousing - Agriculture, Forestry and Fishing - Community and Personnel Service Workers - Machinery Operators and Drivers The Transport, Postal and Warehousing, Agriculture, Forestry and Fishing, and Construction industries were the three main areas in which fatalities occurred, with 62% of all fatalities occurring in these industries. According to Safe Work Australia, many deaths in these industries could not be attributed to their size. Those figures suggest that the work’s nature/conditions/environment is responsible for the disproportionately high fatalities in these areas. - Transport, Postal and Warehousing The road transport industry (including postal and warehousing) had 58 worker fatalities in 2019. The majority of these fatalities were due to vehicle collisions, followed by workers being hit by moving objects. The agriculture industry (including forestry and fishing) had 30 worker fatalities in 2019. Within this number, 27% of worker fatalities are caused by vehicle collisions, 16% caused by workers being hit by moving objects, and 9% driven by falls from a height. The construction industry had 26 worker fatalities in 2019. These fatalities’ leading cause fell from a height (buildings or ladders), followed by workers hit by falling objects, followed by vehicle collisions. - Vehicles: the common thread Overall, 43% of the worker fatalities in 2019 were related to vehicles; 79 out of the 183 total fatalities were attributed to this. Occupation of workers In 2019, workers in the following occupations killed: - 72 Machinery operators and drivers (39% of all fatalities) - 29 Labourers (16% of all fatalities), including farm, forestry and garden workers - 28 Technicians and Tradespeople (15% of all fatalities) - 25 Managers (13% of all fatalities). Thirty-nine bystanders were killed due to the actions of another worker or a fault in a workplace in 2019. 46% were due to a vehicle collision, and 18% were due to a worker hit by a moving object. This article’s data drawn from the Safe Work Australia’s Work-related Traumatic Injury Fatalities Report 2019. Infographic from Safe Work Australia Work-related Traumatic Injury Fatalities Report. Disclaimer – these articles are provided to supply general safety information to people responsible for OHS in their organisation. They are general in nature and do not substitute for legal and/or professional advice. We always suggest that organisations obtain information specific to their needs. Additional information can be found at https://www.safeworkaustralia.gov.au/ Model WHS Laws Amendments: All About Psychosocial Hazards and Risks28 June 2022 Supporting a Support Coordinator to return to work10 June 2022 6 signs you need an ergonomic assessment6 May 2022 Key changes to Model WHS Laws in WA21 January 2022 Why ergonomics is important in the workplace
<urn:uuid:45c2c079-fb9f-4ee2-84a8-6e4ff1678632>
CC-MAIN-2022-33
https://www.rrp.com.au/key-findings-from-safework-australia-2020-report-blog/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00288.warc.gz
en
0.960522
939
2.703125
3
Vision with openFrameworks What you'll learn - work with the best toolkit in C++ i.e openframeworks - perform image processing - work with video I/O - create mind blowing computer vision applications - This is an intermediate level course so students should have a basic understanding of object oriented programming. A little understanding of Linux will be helpful, however it is not a must. - You will require a raspberry pi B+ board - You will also require a webcam or a raspberry pi camera Vision with openFrameworks, openFrameworks is an open source C++ toolkit that assists the creative process by bringing together opensource libraries for graphics, audio/video analysis, image manipulation, computer vision and 3D modeling. This course aims to teach anyone how to get started with oF and build really awesome applications. Vision with openframeworks is for anyone who wants his applications to see and interact with the real world like living beings. You will learn to create applications for major operating systems and additionally we will be working with the raspberry pi and its camera module, so that you can create mini devices equipped with computer vision and be a real entrepreneur. We will start off with the - basics of the toolkit i.e openframeworks, - you will work with user interfaces, - video input/output, - basics of image processing down to rgb and hsv channels and histograms. The prime focus of this course will be on computer vision applications such as - contour detection - color tracking - object detection - face tracking - motion analysis and many more things. There will be detailed projects for each and every module and in addition to that we will work with real products to improve your hands on skills. The ideal student for this course is a programmer who wants to add vision to his applications or an entrepreneur who wants to create a new product or a startup. If you have the basic programming skills and the thirst to learn please join in. Feel free to check out the course contents and free previews, looking forward to seeing you inside. Who this course is for: - Anyone who wants to learn the most comprehensive toolkit for programming in C++ - Anyone who wants to work with images, video, graphics, networking and computer vision - Anyone who wants to add vision to his applications - Anyone who wants to be a real entrepreneur and create futuristic products Hasan is an Embedded Engineer with a bachelor's degree in Electrical Engineering and a master's degree in Computer Engineering. He has been a part of the best R&D organizations working on cutting edge research areas such as mobile security, software defined radios and solid state drives. His expertise involve Embedded Linux, Reconfigurable Computing, DSP Software Systems, Advanced Digital Design and Component-Based Reusable Software. Hasan is on his way to create interactive courses to motivate students back into hardware design.
<urn:uuid:8c0174c5-0588-46b5-b133-37c56af943c9>
CC-MAIN-2022-33
https://www.udemy.com/course/vision-with-of/?couponCode=reddit_9usd
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00288.warc.gz
en
0.916961
608
2.765625
3
UAV bio-inspired sensing Bio-inspired UAV flight control Small unmanned air vehicles (UAVs) have the potential to dramatically change current practices in many areas such as, search and rescue, surveillance, and environmental monitoring. Currently the utility of these systems is limited by their operational endurance and their inability to operate in strong turbulent winds, especially those that often occur in urban environments. Animals such as birds, bats and insects are adapted to be able to fly in these conditions and actually use them to their advantage to minimize their energy output. We are using inspiration from these biological flyers to develop technologies to improve UAV flight performance. One current focus of our research is the use of distributed arrays of force and flow sensors on the wings of UAVs to enable them to sense how the aircraft is interacting with the air around it. This approach is inspired by similar sensor arrays found in birds, bats and insects for air-flow sensing, as well as the water-flow sensing systems of fish. The sensory information available from distributed sensor arrays offers the potential to greatly improve the agility and robustness of autonomous fliers by giving them the ability to sense the aerial environment they are operating in and respond more rapidly and appropriately. This is particularly the case for next generation vehicles with morphing wings, where each part of the wing can be tailored to the local flow conditions. We are currently developing small fixed wing experimental aircraft with arrays of force and flow sensors in order explore the sensory information available from these types of sensors. Through wind tunnel testing and outdoor flight testing we are exploring how these types of sensors can be used in flight control systems and what advantages this offers. - Sergio Araujo-Estrada - Dr Kieran Wood, University of Bristol - Dr Tom Richardson, University of Bristol
<urn:uuid:b3f177d7-d0e3-40cc-8265-e90ac7b91648>
CC-MAIN-2022-33
http://www.bristol.ac.uk/aerodynamics-research/research-projects/bif/research/uav-sensing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00288.warc.gz
en
0.953802
370
3.109375
3
A scope is a subset of the program defined in terms of the visibility of a variable or function. A symbol is said to be “in scope” if its name is visible at a given point of execution. In C, functions may have global or file-static scope; variables may have global, file-static, function, or block scope. The following variables always reflect the current program counter of the current thread or LWP, and are not affected by the various commands that change the visiting scope: Scope of the current program counter Current line number Class to which $func belongs Current source file Current load object When you inspect various elements of your program with dbx, you modify the visiting scope. dbx uses the visiting scope during expression evaluation for purposes such as resolving ambiguous symbols. For example, if you type the following command, dbx uses the visiting scope to determine which i to print. (dbx) print i Each thread or LWP has its own visiting scope. When you switch between threads, each thread remembers its visiting scope. Current visiting load object Current visiting file Current visiting line number All of the components of the current visiting scope stay compatible with one another. For example, if you visit a file that contains no functions, the current visiting source file is updated to the new file name and the current visiting function is updated to NULL. The following commands are the most common ways of changing the visiting scope: When you hit a breakpoint, dbx sets the visiting scope to the current location. If the stack_find_source environment variable (see Setting dbx Environment Variables) is set to ON, dbx attempts to find and make active a stack frame that has source code. When you use the up command (see up Command), the down command (down Command), the frame number command (see frame Command), or the pop command (see pop Command)to change the current stack frame, dbx sets the visiting scope according to the program counter from the new stack frame. The line number location used by the list command (see list Command) changes the visiting scope only if you use thelist function orlist file command. When the visiting scope is set, the line number location for the list command is set to the first line number of the visiting scope. When you subsequently use the list command, the current line number location for the list command is updated, but as long as you are listing lines in the current file, the visiting scope does not change. For example, if you type the following, dbx lists the start of the source for my_func, and changes the visiting scope to my_func. (dbx) list my_func If you type the following, dbx lists line 127 in the current source file, and does not change the visiting scope. (dbx) list 127
<urn:uuid:b5b043f2-765c-452d-8e5e-872fd5ed9be1>
CC-MAIN-2022-33
https://docs.oracle.com/cd/E19205-01/819-5257/bladh/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00288.warc.gz
en
0.875333
627
3.390625
3
Rolling bearing assembly method When assembling the bearing, the most basic requirement is to make the applied axial force directly on the end face of the ferrule of the mounted bearing (when mounted on the shaft, the applied axial force should directly act on the inner ring, When the hole is on the hole, the applied force is directly applied to the outer ring). Try not to affect the rolling elements. The assembly methods include hammering method, press assembly method, hot charging method, and freezing assembly method. 1 Hammering method Use a hammer rod to place a copper rod and some soft materials and then hammer it. Be careful not to let foreign objects such as copper powder fall into the bearing raceway. Do not directly hit the inner and outer rings of the bearing with a hammer or a punch. So as not to affect the bearing precision or cause bearing damage. 2 Screw press or hydraulic machine assembly method For bearings with large interference tolerance, it can be assembled by screw press or hydraulic press. Before the pressure, the shaft and bearing should be leveled and coated with a little oil. The pressing speed should not be too fast. After the bearing is in place, the pressure should be quickly removed to prevent damage to the bearing or shaft. 3 hot-packing method is to heat the bearing to 80 °C-100 °C in the oil, so that the inner hole of the bearing is swollen and put on the shaft to prevent the shaft and bearing from being damaged. For bearings with a dust cap and seal, the internal grease-filled bearing is not suitable for hot charging. (3) The tapered roller bearing clearance is adjusted after assembly. The main methods are gasket adjustment, screw adjustment, nut adjustment, etc. (4) When assembling the thrust ball bearing, the tight ring and the loose ring should be distinguished first. The diameter of the inner diameter of the tight ring is slightly smaller. The tight ring and the shaft after assembly are relatively static during operation. It always leans on the shaft. At the end of the step or hole, otherwise the bearing will lose its rolling action and accelerate wear.
<urn:uuid:6f7cd283-ed60-45b8-a4c8-c24bb2d5f681>
CC-MAIN-2022-33
https://m.ifompt.com/news-575-rolling-bearing-assembly-method.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00288.warc.gz
en
0.906849
433
3.21875
3
The process of counseling is a planned and structured dialogue that takes place between a counselor and his or her client. It is a cooperative procedure whereby a trained professional assists an individual figure out what is causing the concerns or difficulties that he or she is going through. Together, they come up with ways to handle and overcome those issues so that the client acquires new skills and a better understanding of themselves and others. This essay looks at the importance of contracting in counseling and therapy, how the genogram in used, and the CORE 34 assessment tool. It will also explore how all these are incorporated together into the initial therapy session. A counseling contract is mutual agreement in which the counselor and the client negotiate before the therapy begins. It lays down what each party is supposed to do in the course of the therapeutic relationship that they will be in. the contract guarantees that the client is aware of what the therapy entails, and gives him or her the right to informed consent. It keeps the two parties safe with respect to the law and acts as a safety net in case something goes wrong in the course of the therapy (Crews, 2005). The counseling contract is made up of several sections. For one, it is based on a code of ethics that the therapist follows. He or she is supposed to have a copy of these ethics at hand in case the client wishes to go through them. Alternatively, the counselor can provide a website address containing the ethics if there is one. Another part of the contract has to do with confidentiality, which is a crucial component of the code of ethics. According to Eells (2010), for clients to feel comfortable discussing private information, they need a safe place to open their hearts without fear that the information may be disseminated. There are laws in place meant to protect the clients privacy. HIPAA (The Health Insurance Portability and Accountability Act) has a privacy rule that lays down national standards for the protection of information such as that on mental health and psychotherapy. During the first visit, the counselor should provide the client with written information that explains privacy policies and how his or her personal information will be handled. Other information included in the counseling are about therapy sessions such as their frequency, how long they last, their schedule, and whether they can be re-arranged. It also includes the fees charged and options for payment, whether they can be negotiated, and if they are paid at the beginning of the session or at the end. Clarification on session cancellation and holidays should also be included. If the client plans to cancel a session or go on holiday, he or she should indicate how much notice should be given. The counselor should indicate whether a cancellation fee will be charged. The end of the therapy session is stipulated in the contract, with the client being in total control of this part. The therapist is expected to offer advice on the final session and also give a notice on it. He or she should encourage the client to speak their mind if they feel the therapy is not working. Another thing contained in the contract is means of communication between the two parties such as telephone or email. Certain ground rules have to be set such as having a working telephone number and being reachable at all times. If the client is under the age of 18 years, both parents should sign consent. Should this not be possible, at least one of the parents must sign the consent i.e. the one that the client lives. A genogram is a kind of a family tree that offers clinical information on members of a certain family together with their pattern of organization. According to Carr (2006), it is a rather practical and useful for a counselor when accessing a new client. All the information about the clients such as the names and ages of family members, the type of relations that he or she has with them, the familys history and current situation are recorded in a single graph without the use of detailed notes. The genogram is useful to a therapist because he or she is assured from the onset that he or she is in possession of basic information on the client in case of a problem. By quoting the names of people in the clients life right from the beginning, the counselor shows that he is listening and caring; something that goes a long way in building trust (Butler, 2008). According to McGoldrick, Gerson & Shellenberger (1999), a modern family genogram can highlight patterns of difficult emotional relations within the family of a client, such as impairment in children, marital conflict or dysfunction in a spouse. It is capable of presenting patterns of emotional detachment that deter individual members of a clients family from distinguishing from one another. It can offer insight into the processes of transmission passed on from one generation of the client to the other, and which is now having an impact into his or her current relationships or life. The tool can also show how societal, multicultural, religious, historical or spiritual factors influence an individual and his or her family. By doing so, it can help the therapist figure out the root cause of psychosomatic illness, hence allowing him or her to assist the client have an understanding of the complex issues behind various symptoms and how to get rid of them. Considering that a genogram can give someone undergoing therapy a lot of awareness in the baggage that is currently burdening them, it can be an excellent therapeutic tool. Such awareness can spur the individual to become less reliant on their families and adopt more autonomy (Poot & Omnis, 2001). The CORE-OM Assessment Tool The CORE-OM is a generic measurement of psychological distress made up of 34 items. It is a set of self-report questionnaires to be answered by a person undergoing therapy, and can be administered prior to a counseling session, during, and after. The tool is beneficial to therapists, clients and the therapy service in many ways. Brief and user friendly, it allows a counseling session to be customized specifically for a certain client, and is capable of offering feedback in the course of the therapy, not just after. In addition, CORE-OM plays the role of an initial assessment and screening tool in that it is an outcome measure of whether the counseling was of any help. Whats more, it assists therapists identify the individuals under the greatest risk. In the case of counselors, the tool enables them to prove to their clients that the therapy they are offering is effective and useful. CORE-OM proves that progress is being made by offering feedback while the counseling session is ongoing as opposed to when it has actually come to an end. It can assist in highlighting a therapist who is showing signs of success with a certain therapy issue or a group of clients. During a therapy session, it can illustrate to counselors how their strategies are working for people undergoing counseling, hence allowing them to adjust or change treatment. Barkham, M. J. (2012). Psychological treatment outcomes in routine NHS services: What do we mean by treatment effectiveness? Psychology & Psychotherapy: Theory, Research & Practice, 85(1), 1-16. Bolton, G. (2014). Reflective Practice: Writing and Professional Development. Sage. Butler, John F. (2008) The family diagram and genogram: comparisons and Carr, A. (2006) Family therapy concepts, process and practice. 2nd Claiborn, C. K. (2005). Feedback in psychotherapy. Journal Of Clinical Psychology, 61(2), 209-217. contrasts. The American Journal of Family Therapy, Vol. 36, No. 3, pp. 169- Cooper, M. J. (2007). A pluralistic framework for counselling and psychotherapy: Implications for research. Counselling & Psychotherapy Research, 7(3), 135-143. Crews, J. S. (2005). Self-monitoring and counseling skills: Skills-based versus interpersonal process recall training. Journal Of Counseling & Development, 83(1), 78-85. Edition. John Wiley & Sons Ltd. Eells, T.D. (2010). Handbook of psychotherapy case formulation. The Guilford Press. Egan, G. (2013). The skilled helper: A problem-management and opportunity development approach to helping, (10th ed.). Pacific Grove, CA: Brooks/Cole. Kress, V.E., & Paylo, M.J. (2014). Treating Those with Mental Disorders: A Comprehensive Approach to Case Conceptualization and Treatment. Pearson. Kuntze, J., van der Molen, H. T., & Born, M. P. (2009). Increase in counselling communication skills after basic and advanced microskills training. British Journal of Educational Psychology, 79(1), 175-188. doi: 10.1348/000709908X313758. Manassis, K. (2014). Case formulation with children and adolescents. The Guilford Press. McGoldrick, M., R. Gerson and S. Shellenberger (1999). Genograms: assessment and intervention. 2nd Edition. New York: W. W. Norton Poot, F. and L. Omnis (2001) The merits of a systemic vision and the usefulness of the genogram in psychosomatics: Applications to psychodermatology. Dermatology psychosomatics, Vol. 2, No. 2, pp. 77-81. Roberts, A.R., & Yeager, K. R. (2004). Evidence-Based Practice Manual: Research and Outcome Measures in Health and Human Services. Oxford University Press. Scott, A. T. (2012). On becoming a pluralistic therapist: A case study of a student's reflexive journal. Counselling Psychology Review, 27(4), 2840. White, I. (1999) Australian Bush Flower Healing. Bantam Books. Butler, John F. (2008) The family diagram and genogram: comparisons and assessment and intervention. 2nd Edition. New York: W. W. Norton Carr, A. (2006) Family therapy concepts, process and practice. 2nd contrasts. The American Journal of Family Therapy, Vol. 36, No. 3, pp. 169-180. Edition. John Wiley & Sons Ltd. McGoldrick, M., R. Gerson and S. Shellenberger (1999). Genograms: Poot, F. and L. Omnis (2001) The merits of a systemic vision and the psychodermatology. Dermatology psychosomatics, Vol. 2, No. 2, pp. 77-81. the usefulness of the genogram in psychosomatics: Applications to White, I. (1999) Australian Bush Flower Healing. Bantam Books. Cite this page Some Questions on Counseling and Psychotherapy. (2021, Apr 16). Retrieved from https://proessays.net/essays/some-questions-on-counseling-and-psychotherapy If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal: - Argumentative Essay Example on Management of Diverse Teams in Organizations - Urban Sociology Essay - A Design Theory for Digital Platforms Supporting Online Communities: A Multiple Case Study - Analysis of Human Services of an Abusive Scenario - Research Paper - The Effect of Maternal Stress on Prenatal Development - Research Paper - A Situation Online Where I Witnessed Online Trolling and Flaming - Essay Sample - Paper Example on Monogamy, Polygamy, and Polyandry
<urn:uuid:a768db18-75aa-4063-9866-a3498549f9a9>
CC-MAIN-2022-33
https://proessays.net/essays/some-questions-on-counseling-and-psychotherapy
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00288.warc.gz
en
0.923759
2,409
3
3
Millions miss a meal or two each day. Help us change that! Click to donate today! CHAPTER 1 Jerusalem’s Great Desolation and the Sorrow of His People The chapter begins with an outburst of grief over Jerusalem’s desolation. Once she was a populous city; now she is solitary. Once she was great among the nations, like a princess among provinces, and now she is widowed. Then in the next verse we hear her weeping; she weeps all night long; none is there to comfort her; her friends have turned against her, they have become her enemies. She was disobedient to her Lord, she rejected His Word, she gave up her holy place as His separated people and now “she findeth no rest.” The Lord’s hand is upon her for the multitude of her transgressions. The hopeful note we find in Lamentations 1:8-11 . Here is confession of her guilt and shame; here is humiliation and appeal to the Lord on account of the enemy. “See, O LORD, and behold; for I am become vile.” Such humiliation and self-judgment is pleasing in the Lord’s sight. In Lamentations 1:12 Jerusalem speaks: “is it nothing to you, all ye that pass by? Behold, and see if there be any sorrow like unto my sorrow, which is done unto me, wherewith the LORD hath afflicted me in the day of His fierce anger.” The passer-by who beholds the ruins of Zion is asked to look upon the desolations and then to consider that the Lord in His righteous anger smote her, who is still His beloved. Well may we think of Him, who had to say, “See if there be any sorrow like unto My sorrow,” who was smitten and afflicted, upon whom Jehovah’s rod rested, over whose blessed head all the waves and billows of Divine judgment-wrath rolled, He who is the Beloved, the Son of God, our Lord. Again the prophet breaks out in weeping, “His eye runneth down with water.” He is deeply affected over the desolation and judgment which has taken place. But a greater One, greater than Jeremiah, stood centuries after before the same city, brought back from the ruin of Jeremiah’s time. And as He beheld that city He wept, because His omniscient eye beheld a still more appalling judgment for city and nation. Forsaken, uncomforted, distressed, humiliated, sighing and crying, owning her rebellion, vindicating Jehovah and His righteousness, Jerusalem sits in the dust, “abroad the sword bereaveth, at home there is death.” These files are public domain. Text Courtesy of BibleSupport.com. Used by Permission. Gaebelein, Arno Clemens. "Commentary on Lamentations 1". "Gaebelein's Annotated Bible". https://studylight.org/ the Week of Proper 14 / Ordinary 19
<urn:uuid:983b3d58-cc35-43f4-8317-6172cc59e93e>
CC-MAIN-2022-33
https://studylight.org/commentaries/eng/gab/lamentations-1.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00288.warc.gz
en
0.950369
652
2.59375
3
Breath is a vital component to yoga classes. Yoga instructors (myself included) guide students in breath exercises (pranayama) and instruct when to inhale or exhale with movement. Why is the breath such an important part of yoga, and how does it help with overall health? First let’s understand what happens when we breathe. Simply put, as we inhale we bring oxygenated air into the lungs. Oxygen then goes through the blood via red blood cells to all areas of the body. The oxygen then converts glucose to energy, thus supporting physical activity and keeping tissues healthy. Carbon dioxide, which is the waste product in de-oxygenated blood, then leaves the body through the exhale. Increasing the oxygenation in the body helps increase energy to the muscles and decrease pain, it also decreases the chance of injury. Exercise and movement increase red blood cells (remember they carry the oxygen throughout the body). To increase oxygen going to the muscles, one needs to engage in aerobic activities, such as dancing, running, or cycling. Yoga does not get the heart pumping like these activities, but it still can give you great benefit in this process because it strengthens the capacity of the lungs by toning core muscles and the muscles that help with respiration. So get up and do the aerobic exercise that speaks to you…..run, dance, hike or whatever. But first, try toning the respiratory muscles in yoga class or with these practices: - Table Breath - Come to all fours in Table Pose with knees under hips and wrists under shoulders - Curve the spine up (like a Halloween cat) - Take a deep breath in to the torso, feeling the breath expand the ribcage and shoulder blades - Hole for a count or 5-10. Repeat 3-5 times. - Prone Diaphragmatic Toning - Lay on your belly and rest your head on folded hands - Take a breath into the ribspace - Hold for a count of 5-10. Repeat 3-5 times. For more tips, sign up for my newsletter.
<urn:uuid:313ed0a3-c06d-4d8b-b371-23ae11b4e6d1>
CC-MAIN-2022-33
https://wellnesswithlorie.com/2020/09/27/just-breathe/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00288.warc.gz
en
0.9206
436
3.359375
3
Drug abuse can involve more than illegal street drugs. In addition to heroin and cocaine, many people abuse prescription medicines. The most abused prescription drugs are just as problematic as their illegal counterparts. By expanding your awareness of these medicines, you take a step toward avoiding a substance use disorder. The Most Abused Prescription Drugs in the United States A lot of people mistakenly believe that the medicines their doctors prescribe are totally safe. In reality, most prescription drugs cause side effects. Sometimes they even trigger problematic health conditions. The three medications below have a high risk for abuse and addiction development. Central nervous system (CNS) depressants or tranquilizers have a calming effect on the brain. Benzodiazepines or benzos are the most common drugs in this category that people abuse. For example, brand names include Xanax, Klonopin, and Valium. The generic name for Xanax is alprazolam, and doctors prescribe it to treat serious anxiety and panic disorder. It depresses the CNS to make you relax. Thus, abusing the drug causes fast-acting sedation. Similarly, Valium and Klonopin are popular for their sedative effects. Abusing them produces a high that’s similar to drinking alcohol. These benzos can also cause blackouts and overdose may lead to death. Stimulants are a class of drugs that increase brain activity. Because of that, they make you feel more energetic and alert. Two popular examples include Adderall and Ritalin. As an amphetamine, Adderall can treat narcolepsy and attention deficit hyperactivity disorder (ADHD). If you have narcolepsy, the drug helps you sleep by treating your symptoms. If you have ADHD, it helps you focus on tasks. College students most often abuse Adderall, but shift workers and truck drivers use the drug inappropriately as well. In addition, Ritalin is methylphenidate and similar to Adderall. It affects your CNS by stimulating dopamine production in the brain. This hormone heightens your alertness. However, having prolonged high levels of dopamine can lead to dependence and addiction. Opiates and Opioids Opiates and opioids are prescriptions that also stimulate dopamine production. However, doctors prescribe them to treat moderate to chronic pain. Types of opiates, which are natural opium derivatives, include codeine and morphine. On the other hand, types of opioids, which are partial or full synthetics, include oxycodone and hydrocodone. Codeine is a common ingredient in prescription cough syrup. High amounts cause sedation and altered consciousness. It’s also the main ingredient in purple drank, a mixture that includes soda and candy. This beverage became popular in the early 2000s in hip-hop and rap music, and some artists have died from overdoses. Doctors often prescribe oxycodone under the brands OxyContin and Percocet. These and other opioid painkillers change how your brain and CNS respond to pain. They also alter how you perceive pain. Abusing them has a euphoric effect that is highly addictive. Prescription Drug Treatment at Steps to Recovery The most abused prescription drugs are more common than you might want to believe. If you have a prescription pill addiction, help is available at Steps to Recovery. We also provide treatment for other drug addictions, including: Overcome your weakness against prescription or other drugs. Find out how you can stay sober with relapse prevention skills training at our facility. Reach out to us now at 866-488-8684.
<urn:uuid:7ff8bdf5-d033-40dc-b4fe-d90ace95a19f>
CC-MAIN-2022-33
https://www.stepstorecovery.com/rehab-blog/most-abused-prescription-drugs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00288.warc.gz
en
0.938999
745
2.640625
3
The wolverine caught on Rovdata's cameras. Photo: Rovdata The wolverine caused some excitement when it was caught last winter on one of the network of wildlife cameras set up by the Norwegian animal monitoring agency Rovdata, as it is highly unusual for one of the animals, a bear-like carnivore of the weasel family, to be spotted so far south. But now DNA data collected from samples of hair and dung collected last winter, have shown that the exact same animal was also present at a site in Hedmark county and Sweden. "It isn't an area where wolverines have been documented before," Martin Kjørstad from Rovdata told The Local. "We are also sampling hair and dung this winter. If we're lucky we will find this individual again, and then we can see if she is still in Hedmark county or not." He said that this was one of the longest female wolverine journeys that has been documented in Norway. Males tend to make longer trips, with one wolverine once shown to have made his way 800km south from Kiruna in Sweden to Hedmark.
<urn:uuid:5cb0956c-25be-4629-925f-c1c028aa977b>
CC-MAIN-2022-33
https://www.thelocal.no/20140121/video-wolverine-ventures-300km-south-to-oslo/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00288.warc.gz
en
0.969887
240
2.734375
3
Aristotle, and W. Rhys Roberts. Rhetoric. Mineola, NY: Dover, 2004. Kindle Electronic Edition. Book I, chapter 8 Aristotle is emphatic about the responsibility of a speaker to understand situations thoroughly. “The most important and effective qualification for success in persuading audiences and speaking well on public affairs is to understand all the forms of government and to discriminate their respective customs, institutions, and interests” (Aristotle I.8, B 1365b). The ability of whatever government applies to a discussion to make a choice according to its interests is very important. Aristotle discusses in brief the governing style of democracy, aristocracy, and monarchy, as well as the division of monarchy with limited authority and tyranny, which does not have such limitations. He also discusses the goals of different systems. “The end of democracy is freedom; of oligarchy, wealth; of aristocracy, the maintenance of education and national institutions; of tyranny, the protection of the tyrant” (Aristotle I.8, B 1366a). The effective speaker will persuade the audience not only of his cause, but of his being a person who is credible, whose ethics and values are aligned with the audience, and who is trustworthy in advancing the audience’s goals.
<urn:uuid:a6ec346b-fa54-4283-a091-f00e1342344f>
CC-MAIN-2022-33
https://www.wittenbergcomo.com/blog/you-just-didnt-understand
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00288.warc.gz
en
0.951007
266
3.109375
3
People also ask How to draw poppies? Show the wrinkles and curves on petals and leaves with the help of slight brushstrokes. Also outline the shadows under the petals, inside the flower bowl, and the shading on the green leaves and stems. To enliven the picture, add a bit of light, using pastel or colored pencils. Also, you can draw poppies with oil paints. How to draw a flower step by step? Step 1: The first step will be to draw the center of the flower by drawing a circle and then small dashes all the way around it. Step 2: Next draw the large flower petals be creating half circles around the center. What does the petal of a poppy look like? The petal of a poppy is an oval. It is elongate at the bottom 鈥?in the place where it is attached to the stem; its line can be wavy above. How many flowers can you draw in 6 Easy Steps? By following six easy steps, you can start creating a range of eight flower drawings. The very first flower we will learn how to draw is a poppy. Poppies are known for their brilliance in red and their symbolism of remembrance. Although they may seem a bit complicated, they are really easy to draw!
<urn:uuid:801979fc-2b16-4aac-97c4-7b6975f64d4f>
CC-MAIN-2022-33
http://www.mkpv.top/how-to-draw-a-poppy-flower-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.957916
275
3.390625
3
What is SAD? Sad is just one of many words that describe the long, cold winter season. Some people love winter and embrace it; for others, winter presents a battle against fatigue, lack of motivation, and depression. Seasonal affective disorder (SAD) most often reveals its symptoms in the fall and winter, according to the Mayo Clinic. SAD is a mood disorder that affects people at the same time each year. It’s important as an EMS provider to be familiar with SAD, since you may encounter patients producing symptoms of it, perhaps without even realizing they have the disorder. There’s “winter blues” and then there’s an actual mood disorder. Some symptoms of SAD are the same as major depression: - Feeling depressed almost every day, including feeling hopeless or worthless - Low energy and loss of interest in activities you normally enjoy - Trouble sleeping - Changes in appetite or weight - Difficulty concentrating - Feeling unmotivated or agitated - Have thoughts of death or suicide Specific symptoms of SAD include irritability, tiredness, trouble getting along with other people, hypersensitivity to rejection, “leaden” heavy feeling in arms or legs, oversleeping, and cravings for high carb foods, leading to weight gain. What causes SAD? Researchers still don’t actually have a specific answer for this. Instead, there are some factors that come into play for those who suffer from SAD. The reduced number of daylight hours throughout the fall and winter could actually be messing with your biological clock, causing feelings of depression. Additionally, reduced sunlight means reduced vitamin D, and therefore reduced serotonin, our brain’s mood stabilizer. Reduced serotonin levels mean depression can be triggered. Melatonin is the hormone our body produces to help us with sleeping. Melatonin is the reason you feel tired when it’s your usual bedtime, and awake in the morning. Similar to serotonin, the production of melatonin is controlled by how much light we get. Once again, the shorter daylight hours of winter affect when melatonin is produced - so it could be earlier or later in the day than usual. Having a confused sleep cycle can affect your mood and cause symptoms of SAD. Who gets SAD? Women are actually more likely to experience SAD, but their symptoms may not be as severe as men who suffer from SAD. Age also plays a role - younger people are more likely to experience winter SAD. If you have a family member who has SAD or any other depression disorder, you have a higher chance of experiencing it. If you already have depression or bipolar disorder, symptoms can get worse in the winter season, reflecting SAD symptoms. The most obvious group of people that experience SAD live far from the equator - so they experience longer and harsher winters with the most decreased sunlight during the winter. How is SAD diagnosed? While it’s easy to feel down in winter from the lack of daylight hours and sunlight, if you’ve felt down for days in a row and can’t do the things you’d normally enjoy (like seeing friends or family), then this is a sign of a bigger issue. If you find yourself drinking more alcohol, sleeping significantly more or less, or finding changes in your appetite, this also means you should see a doctor. When you see a doctor, they will likely try to rule out SAD from other types of depression, since many symptoms are the same. It’s helpful to track how you’ve felt the last couple of years - did you experience this same depression, then start feeling better by spring? Have you had any weight gain during the winter? Do you find yourself needing more sleep in the winter, then needing much less in the summer? These are some of the questions you could also ask a patient who is exhibiting signs of depressions while taking their history. A doctor may take blood tests to rule out other conditions, such as low thyroid function, that have similar symptoms to SAD and depression. How is SAD treated? There are a few different ways to treat SAD. A main treatment is light therapy, which experts believe works through resetting your biological clock. There are two types of light therapy: bright light treatment (using a light box that you sit in front of while doing another activity, such as reading or working) or dawn simulation (using a dim light that goes on in the early morning while you’re still sleeping, then gets brighter like a sunrise). Typically light therapy is prescribed to be used for 30 minutes to two hours per day. Light boxes have fluorescent lights that are brighter than indoor lights, but are not the same as UV lights, full-spectrum lights, tanning lamps, or heat lamps. Similar to a course of antibiotics or other medications, light therapy should be consistently used every day until the season changes. If you stop using it after a week because you feel better, symptoms will come back. Medications can also be used to treat SAD. Antidepressants help with severe symptoms, including starting the antidepressant before symptoms set in during the fall. It can take several weeks to start noticing benefits from the antidepressant. Psychotherapy can also help with SAD symptoms - by talking with a therapist or counselor, the negative thoughts and behaviors contributing to symptoms could be helped. Learning how to manage stress and SAD can help alleviate symptoms as well. Can SAD be prevented? If you live in a climate that has long winters (such as Minnesota), there’s no exact way to prevent SAD besides moving to a warm climate with more daylight hours during the winter. Do your best to make your environment as bright as possible - sit next to windows while it’s light out and keep blinds open. Get outside as much as you can - remember that it’s not the cold weather that triggers SAD, it’s the lack of daylight hours. Take walks while it’s still light out. The best time to walk is within two hours of getting up in the morning. Exercise or engage in some sort of physical activity regularly to relieve stress and anxiety. Helping relieve those feelings will make them stop contributing to SAD symptoms. Exercising can also lift your mood to keep you feeling happy all winter. Sources and More Information Mayo Clinic, “Seasonal Affective Disorder (SAD).” http://www.mayoclinic.org/diseases-conditions/seasonal-affective-disorder/basics/definition/con-20021047 Positive Health Wellness, "12 Ways to Ease Seasonal Depression - Infographic" by Karen Reed. https://www.positivehealthwellness.com/infographics/12-ways-ease-seasonal-depression-infographic/ PsychCentral, “10 Things You Didn’t Know About Seasonal Affective Disorder” by Jessica Blaszczak. https://psychcentral.com/lib/10-things-you-dont-know-about-seasonal-affective-disorder/ WebMD, “Melatonin - Overview.” http://www.webmd.com/sleep-disorders/tc/melatonin-overview#1 WebMD, “Seasonal Affective Disorder (SAD) - Topic Overview.” http://www.webmd.com/mental-health/tc/seasonal-affective-disorder-sad-topic-overview#1 Jenny Ewen, BA, EMT, Marketing & Student Services
<urn:uuid:da46c8bf-a95b-4c79-83e4-d5d2acac8314>
CC-MAIN-2022-33
https://alliedmedtraining.com/winter-making-sad/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.934653
1,606
3.46875
3
Co-author: Danshipo An 5 min read School-related gender-based violence (SRGBV) is a major obstacle to achieving gender equality. The education system provides opportunities for innovative, effective, and sustainable interventions to prevent violence against and between children, and for changes of attitudes and beliefs towards gender roles. Ample evidence shows that teacher professional development is an effective instrument to improve teacher quality and increase student performance. However, hardly any evidence exists on the effectiveness of teacher professional development in the field of SRGBV. Research conducted by Research Institute for Work and Society at University of Leuven, Royal University of Phnom Penh and VVOB (or education for development) have shown that effective teacher professional development on gender-responsive teaching has positive effects on the occurrence of violence experienced by students in schools (reports forthcoming in 2021). After 480 teachers from primary and lower secondary schools in Battambang province had undergone professional development with VVOB and its partners, the students have reported a decrease in emotional, physical and sexual abuse experienced at or on the way to school. Programmes such as the “Teaching for Improved Gender Equality and Responsiveness” (TIGER) project aim to transform schools into centres of excellence for gender-responsiveness. The TIGER project ensures primary and lower secondary school children are protected from school-related gender-based violence, enabling their equitable participation in all spheres of life at school and at home. Learning from our experience leading the TIGER project, here are some key insights on how schools can prevent SRGBV and promote gender equality. Putting gender at the front and center of education Centering gender in education is beneficial in changing attitudes and beliefs towards gender norms, and preventing SRGBV. Meet Phy Srey Nich, a grade 5 learner, and her teacher, Ms Kun Theary. Both attend Samdach Chea Sim Primary School in Battambang province, Cambodia, where their school is one of 40 pilot schools of the TIGER project. “After I attended the TIGER programme, I applied it to my teaching. For example, I mixed the female and male students, and mixed students with different abilities,” said Ms Kun Theary. As the students learnt more about gender equality and interacted more with the opposite gender, they began to challenge gender roles as well. Through the programme, Phy Srey Nich experienced a mindset and behavioural shift towards gender equality. “I see a difference now. Girls can hang out with boys and vice versa. Girl or boy, we can do the same thing,” she said. She began to teach her siblings about gender equality at home as well, which is indicative of the influence schools have on family behaviour and societal mindsets. Watch more short videos that capture the transformation of various stakeholders, young and old, here. Leveraging hands-on tools for gender-responsive teaching As Phy Srey Nich and Ms Kun Theary’s example illustrates, gender-responsive teaching comprises many aspects that are sometimes overlooked. Being aware of classroom arrangement, for example, where teachers enhance participation of both girls and boys, is a crucial aspect of gender-responsive teaching. ‘Gender-responsive classroom arrangement’ is one of 7 lessons developed for teachers in the TIGER Action Guide. Other lessons are on preparing a gender-responsive lesson plan, gender-responsive teaching materials, use of gender-responsive language and interaction, positive discipline, assessment of gender interactions and stereotypes in the classroom, and the gender-responsive teacher – a reflection. This government-endorsed Action Guide unlocks the potential of teachers and school leaders to provide all learners with opportunities to develop their own talents, irrespective of gender stereotypes. Download the TIGER Action Guide on gender-responsive teaching and school leadership here. Tackling gender bias amongst teachers and school leaders Like anybody else, teachers hold on to social and cultural values and norms that consciously or unconsciously affect their teaching practices. At times, these translate into gender bias and gender discrimination in the classroom. Gender discrimination, and thus gender inequality, will continue to exist in the education sector if teachers remain biased and do not actively challenge traditional gender expectations and norms. Therefore, capacity building on gender-responsive teaching and learning methodologies is important. Teachers need to become aware of, and address, their own gender biases and belief systems, before they can tap into their potential and become real agents of change who successfully challenge gender stereotypes in their classrooms. It is up to the school management to support this transition, by putting the conditions in place that allow teachers to become aware of, and reflect on, their existing beliefs. Applying gender-responsive pedagogy in your school will reduce the occurrence of SRGBV. It means that teachers will provide equal opportunities for all learners to engage and learn, regardless of their sex. This will provide them with the opportunity to give adequate attention to gender issues in teaching and in all interactions both within and outside the classroom. Let us know what you think! Gender equity can only be achieved with broad stakeholder engagement and concerted efforts. As such, we gladly invite you and any other like-minded organisations to use our materials in your activities. The Action Guide and other materials are open educational resources, while research reports are forthcoming in 2021. The TIGER project was carried out with the generous support of the European Union and Belgium.
<urn:uuid:71c3cc5a-7af6-4976-bf09-dc7552e106e6>
CC-MAIN-2022-33
https://avpn.asia/blog/the-role-of-teachers-in-preventing-school-related-gender-based-violence/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.945881
1,115
3.3125
3
DVD recordable and DVD rewritable are optical disc recording technologies. Both terms describe DVD optical discs that can be written to by a DVD recorder, whereas only 'rewritable' discs are able to erase and rewrite data. Data is written ('burned') to the disc by a laser, rather than the data being 'pressed' onto the disc during manufacture, like a DVD-ROM. Pressing is used in mass production, primarily for the distribution of home video. Like CD-Rs, DVD recordable uses dye to store the data. During the burning of a single bit, the laser's intensity affects the reflective properties of the burned dye. By varying the laser intensity quickly, high density data is written in precise tracks. Since written tracks are made of darkened dye, the data side of a recordable DVD has a distinct color. Burned DVDs have a higher failure-to-read rate than pressed DVDs, due to differences in the reflective properties of dye compared to the aluminum substrate of pressed discs. Comparing recordable CDs and DVDs The larger storage capacity of a DVD-R compared to a CD-R is achieved by focusing the laser to a smaller point, creating smaller 'pits' as well as a finer track pitch of the groove spiral which guides the laser beam. These two changes allow more pits to be written in the same physical disc area, giving higher data density. The smaller focus is possible with a shorter wavelength 'red' laser of 640 nm, compared to CD-R's wavelength of 780 nm. This is used in conjunction with a higher numerical aperture lens. The dyes used in each case are different as they are optimized for different wavelengths. R and RW formats "R" format DVDs can be written once and read arbitrarily many times, whereas "RW" formats can be written to repeatedly. Thus, "R" format discs are only suited to non-volatile data storage, such as audio or video. This can cause confusion because the 'DVD+RW Alliance' logo is a stylized 'RW'. Thus, many discs have the RW logo, but are not rewritable. According to Pioneer, DVD-RW discs may be written to about 1,000 times before needing replacement. RW discs are used to store volatile data, such as when creating backups or collections of files which are subject to change and re-writes. They are also ideal for home DVD video recorders, where it is advantageous to have a rewritable format capable of digital video data speeds, while being removable, small, and relatively inexpensive. Another benefit to using a rewritable disc is if the burning process produces errors or corrupted data, it can simply be written over again to correct the error, or the corrupted data can be erased. This is also useful for testing optical disc authoring software. DVD-R and DVD-RW (DVD "dash") This section needs expansion. You can help by adding to it. (July 2020) The DVD-R format was developed by Pioneer in 1997. It is supported by most normal DVD players and is approved by the DVD Forum. It has broader playback compatibility than DVD+R, especially with much older players. The dash format uses a "land pre-pit" method to provide sector address information. DVD "minus" R is not correct, according to DVD-R consortium recommendations; it is, in fact, a dash (i.e. DVD "dash" R). DVD-R and DVD+R technologies are not directly compatible, which created a format war in the DVD technology industry. To reconcile the two competing formats, manufacturers created hybrid drives that could read both — most hybrid drives that handle both formats are labeled DVD±R and Super Multi (which includes DVD-RAM support) and are very popular. There have been three revisions of DVD-RW known as Version 1.0 (1999), Version 1.1 (2000) and Version 1.2 (November 2003). DVD-RW media exists in the recording speed variants of 1× (discontinued), 2×, 4× and 6×. Higher speed variants, although compatible with lower writing speeds, are written to with the lowest error rate at the rated speed, similarly to CD-RW. DVD+R and DVD+RW (DVD "plus") The DVD+R format was developed by a coalition of corporations—now known as the DVD+RW Alliance—in mid-2002 (though most of the initial advocacy was from Sony). The DVD Forum initially did not approve of the DVD+R format and claimed that the DVD+R format was not an official DVD format until January 25, 2008. Developed by Philips and Sony with their DVD+RW Alliance, the "plus" format uses a more reliable bi-phase modulation technique to provide 'sector' address information. It was introduced after the "-" format. Like DVD-R (single-layer), DVD+R (single-layer) media officially exists with rated recording speeds of up to 16× (constant angular velocity). However, on both +R and -R types, some models of half-height (desktop) optical drives allow bypassing the rating and recording at speeds beyond 16× on selected recordable media by vendors considered of high quality, including Verbatim and Taiyo Yuden. On dual-layer media, half-height optical drives released towards 2010, such as the 2007 TSSTcorp TS-H653B, have adapted recording speeds of up to 16× on DVD+R DL media by selected vendors, compared to up to 12× on DVD-R DL. More recent optical drives have reduced their maximum allowable recording speed on both +R DL and -R DL media to 8×, usually P-CAV. All constant linear velocity transfer rates (read and write) of 2.0× on DVD-R/RW have been replaced with 2.4× in the specification for DVD+R/RW. Thus, specification sheets of optical drives list "2.4× CLV" instead of "2× CLV" as the base transfer rate level for DVD+R/RW. Earlier optical drives also have a 1.0× transfer rate level for both DVD-R/RW and DVD+R/RW. DVD+RW supports a method of writing called "lossless linking", which makes it suitable for random access and improves compatibility with DVD players. The rewritable DVD+RW standard was formalized earlier than the non-rewritable DVD+R (the opposite was true with the DVD- formats). Although credit for developing the standard is often attributed to Philips, it was "finalized" in 1997 by the DVD+RW Alliance. It was then abandoned until 2001, when it was heavily revised (in particular, the capacity increased from 2.8 GB to 4.7GB). Another distinction in comparison to DVD-R/RW/R DL is that the recorder information (optical drive model) is not written automatically to DVD+ discs by the drive. Nero DiscSpeed allows proprietarily adding such information for later retrieval. Other changes include the removal of a dedicated SCSI erase command in optical drives, which is done by the software instead that overwrites data with null characters. This means that the standard does not allow reverting the disc to a blank (unwritten) state after the first write. This section needs to be updated.(July 2018) As of 2006, the market for recordable DVD technology showed little sign of settling down in favour of either the "plus" or "dash" formats, which is mostly the result of the increasing numbers of dual-format devices that can record to both formats, known as DVD Multi Recorders. It has become very difficult to find new computer drives that can only record to one of the formats. By contrast, DVD Video recorders still[when?] favour one format over the other, often providing restrictions on what the unfavoured format will do. However, because the DVD-R format has been in use since 1997, it has had a five-year lead on DVD+R. As such, older or cheaper DVD players (up to 2004 vintage) are more likely to favour the DVD-R standard exclusively.[better source needed] DVD+R discs must be formatted before being recorded by a compatible DVD video recorder. DVD-R do not have to be formatted before being recorded by a compatible DVD video recorder,clarification needed] (see DVD+VR and DVD-VR respectively).[ There are a number of significant technical differences between the "dash" and the "plus" format, although most users would not notice the difference. One example is that the DVD+R style address in pregroove (ADIP) system of tracking and speed control is less susceptible to interference and error, which makes the ADIP system more accurate at higher speeds than the land pre pit (LPP) system used by DVD-R. In addition, DVD+R(W) has a more robust error-management system than DVD-R(W), allowing for more accurate burning to media, independent of the quality of the media. The practical upshot is that a DVD+R writer is able to locate data on the disc to byte accuracy whereas DVD-R is incapable of such precision. DVD+R also has a larger Power Calibration Area (PCA). The PCA in DVD+R has a length of 32768 sectors, compared to the 7088 of DVD-R. In the PCA, which is located close to the inner edge of the disc, a 15-step procedure is carried out to calibrate (vary the power of) the disc drive's laser before every and during writing, to allow for small differences between discs and drives. This process is known as a power test. Calibration during writing allows for small changes in quality between different sections of the disc, such as slightly different optical properties, impurities or dye layer thickness in either the plastic or dye. The results of the power tests are stored in a Recording Management Area (RMA), which can hold up to 7,088 calibrations (in DVD-R). The disc can not be written to after the RMA becomes full, although it may be emptied in RW discs. CD-R, CD-RW, DVD-R, DVD+R, DVD-R DL, DVD+R DL, DVD+RW and DVD-R all have a PCA. CDs (and possibly DVDs) may also have two PCAs: one on the inner edge of the disc, for low speed testing, and another on the outer edge for high speed testing. Additional session linking methods are more accurate with DVD+R(W) versus DVD-R(W), resulting in fewer damaged or unusable discs due to buffer under-run and multi-session discs with fewer PI/PO errors. As RAM stands for Random Access Memory, it works more or less like a hard-drive and was designed for corporate back-up use. Developed in 1996, DVD-RAM is a rewritable optical disc originally encased in a cartridge. Currently available in standard 4.7 GB (and sometimes in other sizes), it is useful in applications that require quick revisions and rewriting. It can only be read in drives that are DVD-RAM compatible, which all multi-format drives are. DVD Forum backs this format. It uses physical dedicated sector markers (visible as rectangles on the read side of the disc) instead of the pre-pits or wobbles used in other types of recordable and rewritable media. Multi-format drives can read and write more than one format; e.g. DVD±R(W) (DVD plus-dash recordable and rewritable) is used to refer to drives that can write/rewrite both plus and dash formats, but not necessarily DVD-RAM. Drives marked "DVD Multi Recorder" support DVD±R(W) and DVD-RAM. DVD recordable media are sold in two standard sizes, a regular 12 cm size for home recording and computer usage, and a small 8 cm size (sometimes known as a miniDVD) for use in compact camcorders. The smaller Mini DVD-RW, for example, holds 1.46 GB. |Drive speed||Data rate||Disc write time||Equivalent CD rate||Reading speed| |1×||11.08 Mbit/s||1.385 MB/s||53 min||9×||8×–18×| |2×||22.16 Mbit/s||2.770 MB/s||27 min||18×||20×–24×| |4×||44.32 Mbit/s||5.540 MB/s||14 min||36×||24×–32×| |5×||55.40 Mbit/s||6.925 MB/s||11 min||45×||24×–32×| |6×||66.48 Mbit/s||8.310 MB/s||9 min||54×||24×–32×| |8×||88.64 Mbit/s||11.080 MB/s||7 min||72×||32×–40×| |10×||110.80 Mbit/s||13.850 MB/s||6 min||90×||32×–40×| |16×||177.28 Mbit/s||22.160 MB/s||4 min||144×||32×–40×| |18×||199.44 Mbit/s||24.930 MB/s||3 min||162×||32×–40×| |20×||221.60 Mbit/s||27.700 MB/s||2 min||180×||32×–40×| |24×||265.92 Mbit/s||33.240 MB/s||2 min||216×||32×–48×| - The rotation speed of DVD at ×1 CAV (~580 rpm) is around three times as high as CD at ×1 (~200 rpm) - Disc write time in table does not include overhead, leadout, etc. The following table describes the maximal speed of DVD-R and the relative typical write time for a full disc according to the reviews from cdrinfo.com and cdfreaks.com. Many reviews of multiple brand names on varying conditions of hardware and DVD give much lower and wider measurements than the optimal numbers below. The write time may vary (± 30 s) between writer and media used. For high speed, the write strategy changes from constant linear velocity (CLV) to constant angular velocity (CAV), or zoned constant linear velocity (ZCLV). The table below largely assumes CAV. |Drive speed||Data rate (MB/s)||Data rate (Mbit/s)||Write time for single-layer DVD-R| |2×||2.64||21.12||30 minutes (CLV)| |4×||5.28||42.24||15 minutes (CLV)| |8×||10.56||84.48||8 minutes (ZCLV)| |16×||21.12||168.96||5 min 45 sec (CAV)| |18×||23.76||190.08||5 min 30 sec (CAV)| |20×||26.40||211.20||5 minutes (CAV)| |22×||29.04||232.32||4 min 30 sec (CAV)| |24×||31.68||253.44||~4 minutes (CAV)| Some half-height DVD Multi Recorder drives released since 2007, such as the TSSTcorp SH-S203/TS-H653B (2007) have officially adapted support for writing speeds of up to 12× on DVD-R DL and 16× on DVD+R DL (on recordable media by selected vendors only), while more recent DVD writers such as the SH-224DB (2013) and Blu-Ray writers such as the LG BE16NU50 (2016) have restricted the supported DVD±R DL writing speed to 8×. Most DVD±R/RWs are advertised using the definition of 1 gigabyte = 1 GB = 1,000,000,000 bytes. This can be confusing for many users since a 4.7 GB (4.7 billion bytes) DVD that is advertised as such might show up on their device as having 4.38 GiB (depending on what type of prefixes their device uses). |Format||Decimal Capacity||Binary Capacity| |DVD±R||4.70 GB||4.38 GiB| |DVD±RW||4.70 GB||4.38 GiB| |DVD±R DL||8.55 GB||8.15 GiB| |DVD-RAM||4.70 GB||4.38 GiB| |MiniDVD||1.46 GB||1.39 GiB| |MiniDVD DL||2.66 GB||2.54 GiB| Quality and longevity According to a study published in 2008 by the Preservation Research and Testing Division of the U.S. Library of Congress, most recordable CD products have a higher probability of greater longevity compared to recordable DVD products. Media of higher quality tends to last longer. Using surface error scanning, the rate of correctable errors can be measured. A higher rate of errors indicates media of lower quality and/or deteriorating media. It may also indicate scratches and/or data written by a defective optical drive. Not all optical drive models are able to scan the disc quality. DVD-R discs are composed of two 0.6 mm acrylic discs, bonded with an adhesive to each other. One contains the laser guiding groove and is coated with the recording dye and a silver alloy or gold reflector. The other one (for single-sided discs) is an ungrooved 'dummy' disc to assure mechanical stability of the sandwich structure, and compatibility with the compact disc standard geometry which requires a total disc thickness of about 1.2 mm. The sandwich structure also helps protect the layer containing data from scratches with a thick "dummy" disc, a problem with CDs, which lack that structure. Double-sided discs have two grooved, recordable disc sides, and require the user to flip the disc to access the other side. Compared to a CD's 1.2 mm thickness, a DVD's laser beam only has to penetrate 0.6 mm of plastic in order to reach the dye recording layer, which allows the lens to focus the beam to a smaller spot size to write smaller pits. In a DVD-R, the addressing (the determination of location of the laser beam on the disc) is done with additional pits and lands (called land pre-pits) in the areas between the grooves. The groove on a DVD-R disc has a constant wobble frequency of 140.6 kHz used for motor control, etc. In 2011, JVC announced an archival DVD recording medium manufactured with quality control and inspection frequencies techniques greater than is traditionally used in media manufacturing, and using specially developed silver alloy as a reflective layer and organic dye with in-house developed additives to secure long-term data retention. The recording layer in DVD-RW and DVD+RW is not an organic dye, but a special phase change metal alloy, often GeSbTe. The alloy can be switched back and forth between a crystalline phase and an amorphous phase, changing the reflectivity, depending on the power of the laser beam. Data can thus be written, erased and re-written. In October 2003, it was demonstrated that double layer technology could be used with a DVD+R disc to nearly double the capacity to 8.5 GB per disc. These dual layer (DL) versions, DVD-R DL appeared on the market in 2005. A specification for dual-layer DVD-RW discs with a capacity of 8.5 GB (8,500,000,000 bytes) was approved by the DVD Forum, and JVC announced their development of the first media in the format in 2005. A double-layer DVD+RW specification was approved in March 2006 with a capacity of 8.5 GB. However, manufacturing support for these rewritable dual-layer discs did not materialize due to costs and expected competition from newer and higher-capacity formats like Blu-ray and HD DVD. - "Pioneer Announces New, Lower Prices for DVD-R and DVD-RW Media". Pioneer Electronics USA. - "History of Pioneer Corporation". Pioneer Corporation. Archived from the original on 2017-07-15. Retrieved 2019-12-06. - "80 mm (1,23 Gbytes per side) and 120 mm (3,95 Gbytes per side) DVD-Recordable Disk (DVD-R)" (standard). ECMA. December 1998. 279. Retrieved 2013-01-29. - "Understanding DVD - Physical, Logical and Application Specifications". www.osta.org. Optical Storage Technology Association. Retrieved 28 July 2020. - Pioneer computer drive archive - "Notice to the DVD-RW Book Subscribers" (2004-02-25). www.dvdforum.org. Retrieved 27 July 2020. Important Notice to the subscribers of the DVD-RW Format Specifications Book Ver.1.2 - Archive of discontinued Hitachi-LG Data Storage optical drives - Archive of TSSTcorp optical drive manuals - "Ritek DVD-RW tests". Club Myce - Knowledge is Power. Club Myce. 24 September 2003. Retrieved 13 August 2020. - "DVD6C Announces New Licensing Program". DVD6C LA. Archived from the original on 2008-01-29. Retrieved 2008-01-25. - "Data Interchange on 120 mm and 80 mm Optical Disk using +R Format – Capacity: 4,7 and 1,46 Gbytes per Side (Recording speed up to 16×)" (standard) (4th ed.). ECMA. June 2008. p. 4. 349. Retrieved 2013-01-29. - "Why DVD+R(W) is superior to DVD-R(W) - Myce.com". June 23, 2003. Retrieved 24 April 2017. - "Super -writemaster DVD Writer SH-S203B(TS-H653B)/ SH-S203D(TS-H653D)" (PDF) (User manual) (in Korean). Samsung Electronics. 2007. Archived (PDF) from the original on 2020-08-07. Retrieved 2020-08-07. - Archive of discontinued Hitachi-LG Data Storage optical drives - "Maxell DVD+RW RITEK...004 4x DVD Media". VideoHelp. 2006. Retrieved 13 August 2020. - "DVD+RW 4x RITEK-004-000". www.ez647.sk. Retrieved 13 August 2020. - "SPECIFICATIONS Model GHB0N.AFCK101 for" (PDF). Fujitsu. 2013-11-13. - "GH24NSD0 SPECIFICATIONS Model GH24NSD0 For LG-Brand" (PDF). Hitachi-LG Data Storage. - "Range Of Available Standards - DVD Burner Test: Seven Times The Capacity". 7 February 2003. Retrieved 30 December 2016. - Maguin, T. (2014-02-26). "cdvdcontrol • man page". helpmanual.io. Retrieved 13 August 2020. - "AOpen DVD+RW RW5120A Manual Germany" (PDF). ftp.AOpen.com (in German). AOpen, Inc. 2002. Retrieved 13 August 2020. - "CD-DVD Speed Recorder Information". ImgBurn. 2006-07-30. Retrieved 30 July 2020. - van Hove, Peter (c. 2012). "Quick erased (blanked) CD-RW vs. DVD-RW vs. DVD+RW, what's recoverable and how". IsoBuster. Archived from the original on 2012-09-24. Retrieved 2020-07-19. - "JVC announces first rewritable single-sided dual layer DVDs". Engadget. - "JVC | DVD-RW 8.5GB DL Rewritable DVD (2) | VDWDL85GU2 | B&H;". February 21, 2009. Archived from the original on February 21, 2009. - "Double Layer DVD+RW Media Closer to Production". March 30, 2006. - "Dual Layer DVD Re-writable Formats On the Way". June 7, 2006. - "Understanding DVD -Recording Hardware". www.osta.org. Optical Storage Technology Association. Retrieved 14 August 2020. - DMR-EX769 (user manual), Panasonic, Machine will not record 16:9 format video to DVD+R(W). - "What is DVD?". Video help. Retrieved 2008-07-23. - "Everything you Wanted to Know About CDs". www.co-bw.com. - "Optiarc--products were developed specifically for the professional digital content market". www.optiarcinc.com. - "United States Patent: 9105275 - Method for sensing the physically-recordable maximum capacity of a disc". - "Power Calibration Error Messages". March 27, 2010. Archived from the original on March 27, 2010. - Ballou, Glen (March 5, 2015). Handbook for Sound Engineers. CRC Press. ISBN 9781135016661 – via Google Books. - "Optical disk device". - "Method for controlling optical disk". - "DVD+RW Alliance - Customer Benefits". dvdrw.com. DVD+RW Alliance. Archived from the original on 7 August 2003. Retrieved 30 July 2020. - McFarland, Patrick (October 30, 2006), How To Choose CD/DVD Archival Media, Ad terras pera spera. - "Increased compatibility: DVD bitsetting". CD freaks (review). Archived from the original on July 24, 2008. Retrieved 2008-09-15. - "TEAC Corporation DVD/CD-Rewritable Drive Specification DV-W5500S-000 Rev. 0.94 1/24 DVD/CD-Rewritable Drive Product Specification Model : DV-W5500S-000 Drive Specification" (PDF). TEAC Corporation. Retrieved 30 January 2015. - "Sony's 'miracle' DVD writer hits 24x write speed". TG daily. Archived from the original on 2010-01-15. Retrieved 2009-02-26. - The Byte Converter, archived from the original on 2013-11-03. - "Understanding DVD". Optical Storage Technology Association. 2004. Retrieved 2008-09-06. - CD-R and DVD-R RW Longevity Research, US: Library of Congress. - "QPxTool glossary". qpxtool.sourceforge.io. QPxTool. Retrieved 22 July 2020. - JVC introduces archival grade DVD-R media, Broadcast engineering, November 23, 2011, archived from the original on June 14, 2012. - "DVD Types | DVD-RAM vs DVD-RW vs DVD-R vs DVD+R vs DVD+RW". Nordex Media. 6 May 2017. Retrieved 30 July 2020. - DVD Specifications for Re-recordable Disc for Dual Layer (DVD-RW for DL) Physical Specifications, Version 2.0 - "JVC Develops World's First Single-sided, Dual Layer DVD-RW Disc Technology" (PDF). 2005-04-04. Archived from the original (PDF) on 2014-12-21. Retrieved 2016-03-25. Victor Company of Japan, Ltd. (JVC) is pleased to announce that it has developed the world's first [as of April 4, 2005] single-sided, dual layer DVD-RW disc technology with a maximum storage capacity of 8.5GB - DVD+RW part 2: Dual Layer, volume 1; DVD+RW 8.5 Gbytes, Basic Format Specifications, version 1.0, March 2006 - Bennett, Hugh (July 1998), "In DVD's Own Image: DVD-R Technology and Promise", EMedia Professional, pp. 30+. - ——— (Apr 2004), Understanding Recordable & Rewritable DVD, Cupertino: Optical Storage Technology Association. - ISO/IEC 17341:2009, Data interchange on 120 mm and 80 mm optical disk using +RW format -- Capacity: 4,7 Gbytes and 1,46 Gbytes per side (recording speed up to 4X) - ISO/IEC 26925:2009, Data interchange on 120 mm and 80 mm optical disk using +RW HS format -- Capacity: 4,7 Gbytes and 1,46 Gbytes per side (recording speed 8X) - ISO/IEC 29642:2009, Data interchange on 120 mm and 80 mm optical disk using +RW DL format -- Capacity: 8,55 Gbytes and 2,66 Gbytes per side (recording speed 2,4X) - DVD Forum. - "Understanding Recordable & Rewritable DVD", Technology, Osta. - Why DVD+R(W) is superior to DVD-R(W), Myce. - Care and Handling of CDs and DVDs (report), Clir, 121. - 80 mm (1.23 GB per side) and 120 mm (3.95 GB per side) DVD-Recordable Disc (DVD-R) (standard), ECMA, 279. - Data interchange on 120 mm and 80 mm Optical Disc using +R format (technical specification), ISO/IEC, 2005, 17344. - Data interchange on 120 mm and 80 mm optical disc using +R DL format – Capacity: 8.55 GB and 2.66 GB per side (recording speed up to 16×) (technical specification), ISO/IEC, 2008, 25434. - What's the difference between DVD-R and DVD+R? (Q&A), DVD demystified, archived from the original on August 22, 2009. - ISO/IEC 17342, 80 mm (1,46 Gbytes per side) and 120 mm (4,70 Gbytes per side) DVD re-recordable disk (DVD-RW) - ISO/IEC 17342:2004 - publicly available standard - Understanding Recordable & Rewritable DVD by Hugh Bennett - Why DVD+R(W) is superior to DVD-R(W) - "Recorder and method for recording information on a write once recording medium". 23 June 2004. Retrieved 30 July 2020.
<urn:uuid:f058766a-0bf7-482e-83a3-36a20e9023ef>
CC-MAIN-2022-33
https://en.wikipedia.org/wiki/DVD_recordable
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.86864
6,741
3.265625
3
During a time of globalization, colonization, and warfare, Europeans in the Renaissance embraced new technology even as they lamented its disruptive, destructive, and destabilizing consequences. Renaissance Invention explores the conception of novelty and technology through an unprecedented study of Nova Reperta (New Discoveries), a late sixteenth-century print series that celebrated the marvels of the age, including the stirrup, the cure for syphilis, and the so-called discovery of America. Designed in Florence and printed in Antwerp, the Nova Reperta images spread far and wide, shaping Europeans’ perceptions of the innovations that were changing the world and breeding anxiety about the future. In Renaissance Invention, materials from the Newberry’s collection will appear alongside armor from the Art Institute of Chicago and astronomical instruments from the Adler Planetarium, transporting visitors to a time of change, disruption, and technological development that bears a striking resemblance to our own today. Renaissance Invention was commended by the 2019 Sotheby’s Prize for its innovation and curatorial excellence. Renaissance Invention is supported by Mr. and Mrs. Edward M. Blair, Jr., Dr. Christine M. Sperling, Pam and Doug Walter, and an anonymous donor. Support for related public programs is provided by the Samuel H. Kress Foundation.
<urn:uuid:b8f58c36-3f8d-4dbd-8a94-d9138a5b0ea2>
CC-MAIN-2022-33
https://newberry.org/renaissance-invention
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.909904
280
2.9375
3
The Accelerating Land Carbon Sink of the 2000s May Not Be Driven Predominantly by the Warming Hiatus Geophysical Research Letters Recent studies attributed the accelerating land carbon sink (S LAND ) during the 2000s to respiration decrease induced by the warming hiatus. We used two long-term atmospheric inversions, three temperature data sets, and eight ecosystem models to test this attribution. Our results show that the changes in seasonal S LAND trend between the warming (1982-1998) and hiatus (1998-2014) periods do not track evidently the changes in seasonal temperature trends at both global and regional scales. A ... eptual model of the annual/seasonal temperature response of respiration suggests that changes in seasonal temperature during this period are unlikely to cause a significant decrease in annual respiration. The ecosystem models suggest that trends in both gross primary production and terrestrial ecosystem respiration slowed down slightly, but the resulting slight acceleration in net ecosystem productivity is insufficient to explain the increasing trend in S LAND . Instead, the roles of alternative drivers on the accelerating S LAND seem to be important. Plain Language Summary Understanding the mechanisms controlling changes in the land carbon sink is of great importance for projecting future climate. Recent studies attributed the accelerating land sink during the 2000s to the respiration decrease induced by the warming hiatus. By analyzing changes in seasonal and regional trends in the observed CO 2 fluxes and temperature, we show that the seasonal/spatial trend changes of temperature are not consistent with patterns of the land sink. The ecosystem model simulations also suggest that the slight increase in terrestrial ecosystem carbon sink cannot explain the significant enhancement of land sink during the warming hiatus. These results collectively showed that the warming hiatus could not explain the accelerating land sink and other processes should be reevaluated.
<urn:uuid:7904c57c-e56f-483e-a578-380ac0ae789c>
CC-MAIN-2022-33
https://scholar.archive.org/work/v4yebrzwfjflbaewppuodwzy6i
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.881009
400
2.8125
3
Thumbthing to make reading fun! Publishing and distributing books in English Hindi, Tamil, Malayalam, Telugu, Kannada, Marathi, Gujarati and Bangla have opened up opportunities for us to work with groups involved in promoting reading literacy. We are, therefore, constantly aware of their concerns about the poor reading skills of children who have had little exposure to books and have always tried to address them in different ways in our books. Being part of a committee set up by the NCERT for developing graded readers in Hindi – the Barkha series – to build the child’s reading skills was a learning experience. The committee had reading experts, government school teachers, children’s writers in Hindi, and illustrators. Their experience and inputs were very insightful. And this was the inspiration for Tulika’s beginner reading series, the Thumb Thumb Books – a series that combines the requirements of beginner readers with the creativity and vibrancy of imaginative children’s books. The series has as its central characters Thumb Thumb Thangi and Thumb Thumb Thambi inspired by visuals using the thumbprint. As Arvind Gupta, the well-known scientist and children’s writer puts it in his book of thumbprints, “Print your thumb... you might find in it a clown, a bird, a lion, a crawling snail...a snorting whale!” It is this sense of a world of possibilities that the Thumb Thumb books convey to young readers through words and pictures. The handy-sized, brightly produced books are designed to be inviting to children who are just beginning to read. The language and style of the texts are intentionally minimalist. It is simple but not simplistic. Short sentences, bold typography set in lots of white space and vibrant illustrations make the books friendly and accessible. A lot of care has been taken to keep the text and visuals free of class, caste, language and gender biases – always a big challenge in creating a series that can work multilingually across a multicultural country like India. At the end of each book, the child is encouraged to make a thumbprint-based drawing inspired by the story. The idea is to help children make personal connections with Thambi and Thangi, and feel at home inside the pages of the books they read. The slogan on the last page declaring 'I Can Read this Book' affirms the young reader's freedom and independence, while at the same time acknowledging the achievement. It also underlines the fact that the series is designed for individual readers, each going at her or his own pace, with or without help. One of our interns, Niveditha Subramaniam, who has also written and illustrated one of the books, sums it up perfectly: Tulika envisages the Thumb Thumb series as a rolling stone, something that different artists and writers can contribute to over time, each book stamped with their special creativity. We begin with Thumb Thumb Thambi and Thumb Thumb Thangi, but the thumbprint on the move takes on personalities, its lines and whorls form things not one quite like the other, leaping in and out of pages and wandering into the lives of children. Tulika hopes, through the series, to evolve a dynamic and inexhaustible creative space for children to learn to read. - Radhika Menon, Publisher
<urn:uuid:0f73e34d-1048-4466-b927-0e2b838adfee>
CC-MAIN-2022-33
https://tulikapublishers.wixsite.com/blog/post/thumbthing-to-make-reading-fun
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.959219
699
2.59375
3
Borosilicate glass has experienced a surge in popularity in the last few years. It’s reached the point where you can find this glassware in most homes, restaurants, and cafes. A lot of people are familiar with glassware but know little about the different kinds. Knowing about the different kinds of glassware can make it easier for you to purchase drinks and food, as well as choose proper dishes for home use. Borosilicate glass is one of the most durable and versatile types of drinking glass. Keep reading to learn about Borosilicate glass. What Is Borosilicate Glass? Borosilicate glass is a strong and heat-resistant type of glass that is often used for scientific and industrial applications. It is made from a mixture of boric oxide and silica, which gives it its unique properties. Borosilicate glass is much stronger than regular glass and can withstand higher temperatures. It is also less likely to break and shatter than other types of glass. This makes it an ideal choice for scientific, industrial applications, and cookware where glassware needs to be strong and heat-resistant. It is also very clear and has a high resistance to UV light, making it ideal for storage containers and labware. Uses of Borosilicate Glass: From Kitchenware to Scientific Equipment One of the most popular uses for borosilicate glass is in cookware. Because it is so resistant to heat, it is often used in baking dishes, casseroles, and even ovenware. It is also a popular choice for storage containers, due to its ability to resist shattering and breaking. Beyond the kitchen, borosilicate glass has a number of other uses. Borosilicate glass in lab equipment is very common, such as test tubes and beakers, GC vials and caps as well as in optical devices. Its durability also makes it a popular choice for industrial applications, such as glass lamps and glass cutting boards. No matter what the application, this glass is made of versatile material that can stand up to a variety of uses. Its strength and durability make it a popular choice for both everyday and specialized applications. Why Borosilicate Glass is Best for Baking and Cooking It is made to withstand high temperatures, so it is perfect for baking. It will not warp or crack as other materials can. This glass is also non-porous, so it will not absorb food odors or flavors. Borosilicate glass is also lightweight, making it easier to handle when hot. It is also shatter-resistant, making it a safer option for cooking and baking. If you are looking for the best bakeware and cooking vessels, look for those made from borosilicate glass. You will not regret the results. Products Made of Borosilicate Glass One of the most popular products made from borosilicate glass is Pyrex. Pyrex is a line of cookware and bakeware that is made from borosilicate glass. This type of glass is able to withstand high temperatures, so it is perfect for use in the kitchen. This is also used in making art glass. This type of glass is perfect for artists because it can be melted and formed into a variety of shapes. It’s also durable and can create functional pieces like vases and drinking glasses. In choosing for dinking research and check borosilicate glass vs soda-lime glass to know the difference. Get Yours Now! Borosilicate glass is a strong, durable, and heat-resistant material that is perfect for use in a wide variety of applications. If you are looking for a high-quality glassware option, borosilicate glass should be at the top of your list so shop for it now. Did you find this article helpful? Check the rest of our site for more content!.
<urn:uuid:d67dd409-b89d-4eec-8c7a-c4cdc499abe9>
CC-MAIN-2022-33
https://vatsnew.com/lifestyle/home-n-garden/what-is-borosilicate-glass-why-choose-it-over-other-glassware/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.949733
803
2.640625
3
Dashes and Parentheses Like all punctuation marks, dashes and parentheses ensure the clarity of writing by setting apart words, phrases, and clauses that are not part of the grammatical structure of the main clause but provide additional information. Parentheses indicate more emphasis than commas; dashes indicate more emphasis than parentheses. Both dashes and parentheses should be used sparingly to ensure emphasis. Always use both opening and closing parentheses. Place space before opening parentheses and after closing parentheses. Do not place spaces before or after dashes. Separate appositives that contain commas 1. Use dashes to separate appositive that contain commas or commas and semicolons. Appositives are nouns, pronouns, or noun phrases that modify or explain another noun, pronoun, or noun phrase. For example: - My cousins—Oliver, Harry, and Lyra—cannot attend my birthday party. - The three articles—“How to Use Commas,” “How to Use Semicolons,” and “How to Use Hyphens”—are available on the website. - The teacher wrote the titles of the books—The Golden Compass, The Subtle Knife, and The Amber Spyglass—on the board. - The final four cities—Chicago, Illinois; London, England; Paris, France; and New York, New York—will compete for the grand prize. 2. Use parentheses to introduce emphasizations with a moderate level of emphasis. For example: - I am afraid to fly (although I know riding in an airplane is safer than driving a car). - Many employees (mostly recent graduates with student loans) must ride the bus to work. - When my husband picked me up in a new car (a shiny, purple BMW), I guessed that he had received a large raise. Use dashes to introduce emphasizations with the highest level of emphasis. For example: - The idea that women are inferior to men is ridiculous—even preposterous. - That many children go hungry every day in American is sad—possibly tragic. - The woman could not believe the man standing on her front porch was who he said he was—the father who had abandoned her as a child. 3. Use parentheses to enclose clarifications. For example: - We owe the bank thirty thousand dollars ($30,000). - Books in IRMA (Infrequently Requested Materials Area) are still available for patron use. - The diagram (Figure 1) explains the desired workflow. Enclose asides and additional information 4. Use parenthesis to enclose asides and additional information that are not part of the grammatical structure of the main clause. For example: - Many patrons (mostly freshmen and transfer students) will need a tour of the library. - My boss finally answered (after ignoring me for an entire week) that she could not transfer me to another department. - Your neighbors (the people who left their broken truck in the middle of the road) are quite annoying. - My puppy (he was completely potty-trained in less than a day) needs to go outside at least three times a day. 5. Use dashes to introduce explanations that are not part of the grammatical structure of the main clause. For example: - The Fourth Amendment—protection from unreasonable search and seizure—prevents the police from entering my house and taking my belongings on a whim. - The first law of motion—every object in motion will stay in motion until acted upon by an outside force—explains why a ball dropped from the top of a roof will not stop in mid-air but will continue to fall until it hits the ground. Introduce an explanation of a preceding series 6. Use dashes to introduce an explanation of a preceding series. For example: - Reliability, trustworthiness, diligence—this company only hires employees with all of these traits. - Male and female, old and young, short and tall—people of all shapes and sizes can participate in activities at the community center. Enclose numbers or letters in a list 7. Use parentheses to enclose numbers or letters in a list that is part of the grammatical structure of the clause. For example: - Prepositional phrases function as (1) modifiers, (2) complements, (3) adjuncts, (4) adverbials, and (5) subjects. - The department is looking for a new manager who (1) can work any shift, (2) will work multiples shifts per day, and (3) is willing to work overtime. For more information on the use of parentheses, hyphens, and other related punctuation marks in English, please read the following articles available on Bright Hub: - Lesson Plan: How to Use Parentheses - The Use of Hyphens in Written English - The Use of Brackets and Braces in Written English The accompanying printable reference sheet of the rules for using dashes and parentheses in English is available for download at The Use of Dashes and Parentheses in Written English Reference Sheet.
<urn:uuid:9c9610dd-a759-4a99-9677-ba35fbf4b08d>
CC-MAIN-2022-33
https://www.brighthubeducation.com/english-homework-help/29159-how-to-use-parentheses-and-dashes/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.893652
1,087
4.1875
4
Malignant mesothelioma is a tumour originating from mesothelial cells. 85–95% of mesotheliomas are caused by asbestos exposure. It occurs much more commonly in the chest (malignant pleural mesothelioma) than in the abdomen (peritoneal mesothelioma). Rarely mesothelioma arises in the pericardium or tunica vaginalis testis, the membrane surrounding the testicles. It is accepted by all expert bodies including the World Health Organisation that all types of asbestos cause mesothelioma. Crocidolite (blue asbestos) carries the highest risk, amosite (brown asbestos) is almost as dangerous, and chrysotile (white asbestos) the least dangerous. Some of the cases which arise in patients who cannot recall any asbestos exposure probably result from unidentified occupational or domestic exposure. Many cases have occurred in families of workers exposed to asbestos who carried the dust home on their clothes and hair. Other cases probably arise as a result of contamination of the air by asbestos fibres released from asbestos in the environment. A few cases probably occur spontaneously unrelated to any asbestos exposure. Any type of cancer can arise spontaneously as a result of accidental genetic mutations In the UK, there are now around 2500 mesothelioma deaths a year, expected to stay around this level until the end of the decade before a slow decline. Mortality is beginning to decline in younger men but overall is expected to increase by 10-20% over the next 5-10 years, then to fall gradually. Mesothelioma may occur after a small exposure to asbestos but the risk increases with the amount of asbestos exposure. The usual interval between first exposure to asbestos and death from mesothelioma is around 40 (30-50) years but may be as little as 10 years or as much as 60 years or more. The risk of mesothelioma is not affected by smoking. Presentation and Diagnosis Patients with pleural mesothelioma usually present to their doctor with chest pain and/or breathlessness. Usually, there is a pleural effusion (i.e. fluid in the chest cavity) accounting for the breathlessness. They may have a cough, feel tired and generally unwell. Chest X-rays and CT scans often lead to a strong suspicion of mesothelioma. It is necessary to take samples of tissue (a biopsy) from the tumour or fluid from the pleural cavity for examination under the microscope in order to confirm the diagnosis. The samples can often be obtained by passing a special needle through the skin of the chest. This is often done with help from an ultrasound scan or CT scan to make sure the most appropriate area is sampled. These procedures are done under local anaesthesia. Sometimes these methods do not give the diagnosis. It is then necessary to perform a small operation known as a thoracoscopy or pleuroscopy. This is done under general anaesthesia or sometimes under local anaesthesia. It involves small incisions in the chest between the ribs to allow a viewing telescope and forceps to be passed into the chest. The surgeon can see the tumour and take samples from it. When the samples have been obtained the pathologist looks at them under the microscope and performs special stains to identify the tumour as a mesothelioma and to determine the type of mesothelioma. This often takes a week or more. The principal histological varieties are epithelioid, sarcomatoid and mixed. Patients with the epithelioid type tend to survive a little longer. The median survival from presentation is 12–18 months; a few patients with epithelioid tumours survive for more than 5 years. It is important to appreciate that these are average figures and should not be taken as predictions of life expectancy for an individual patient without consideration of the particular circumstances of that patient. Source: Dr Robin Rudd, MA MD FRCP, Consultant Oncologist: Reviewed by Dr Robin Rudd: March 2017
<urn:uuid:170c7a04-3f6b-4720-91bf-f73ba851bb32>
CC-MAIN-2022-33
https://www.clydesideactiononasbestos.org.uk/asbestos-related-disease/mesothelioma
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.94053
846
3.53125
4
ISAAC Increasing Social Awarness and ACceptance of biogas and biomethane Goal: The main scope of the project ISAAC is the removal of non-technical barriers to widespread production and use of biogas/biomethane in Italy. The goal is to establish biogas and bio-methane as viable and attractive options for investors, farmers or foresters, waste and energy companies/utilities and governments, thanks to several opportunities, such as the injection into the national gas grid and the use as fuel for transportation or cogenerative power plants. Although Italy is the second European biogas producer after Germany, counting more than 1200 plants and a total installed electricity of more than 1000 MWel (according to data from GreenGasGrids project, October 2014 and energies-renouvelables.org) and still has a great potential for biogas production and market expansion, there are some non-technical barriers that prevent a more widespread diffusion of the anaerobic digestion (AD). One of the most important non-technical barrier for biogas development in Italy is the social barrier as well as the NIMBY Syndrome: hundreds of civil protest groups were born everywhere in Italy and in 2013 a national coordination committee was established in central Italy against biogas plants. Often, in Italian territories we can find at local level a lack of transparency in the decision process, low involvement and information for locals, underestimation of social effects, environmental and health impact, political adverse positions, doubts on private investments on issues directly affecting citizens’ life. This causes a general opposition to biogas, often without any scientific support, that provoke the project failure. A non-exhaustive list of them is reported below: a) Social barriers: Lack of information on the biogas and biomethane production among citizens, farmers and foresters; Resistance by citizens and local administrations against the construction of new AD plants; Lack of interaction between different stakeholders; Reluctance of farmers, especially in Southern Italy, to cooperate in energy plants management. Many small farms don’t produce enough biomass to feed a digester or can’t invest big resources; the aim is to put together producer to collect larger quantities of biomass and maximize economic advantages and energy efficiency. b) Legislative barriers: Lack of a clear national legislation for grid injection of biomethane and for the use of digestate; Fragmentation and multiplicity of regulatory framework on authorization and installation procedures. c) Economic barriers: Lack of specific and efficient schemes of financing; • Low profitability of small biogas and uncertainty about future incentive schemes. - Apr 2018
<urn:uuid:2250889d-51d5-4698-adb2-df7bf7b42135>
CC-MAIN-2022-33
https://www.researchgate.net/project/ISAAC-Increasing-Social-Awarness-and-ACceptance-of-biogas-and-biomethane
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00288.warc.gz
en
0.922473
565
2.546875
3
Feb 26, Tree cutting and power line safety Always look for nearby power lines before beginning to cut down any tree. Call the local utility before cutting down any tree that might fall into a power line. Treat all power lines as energized. Never climb or attempt to fell a tree that has a limb caught in a power line. Dec 12, Idaho Power: Idaho power states that if a tree falls on power lines due to severe weather by saying: “When severe weather causes trees or other vegetation to fall across power lines, creating power outages, we cut the trees and brush so poles and lines can be replaced and re-energized. Disposal of any wood, limbs or debris resulting from this. 4 – Tree Trimming Safety. Greatest Dangers. The most common types of serious tree trimming accidents are: 1. Electrocution. You can be seriously injured or killed if you come into contact. with an electric line. The climbing cradle helped hold the victim in place while he made his cuts with the chainsaw. 2. Falling From Trees. You can be seriously injured or killed if you fall from a tree. 3. Being Struck by Trees or LimbsFile Size: 1MB. That’s why you should always stay at least 10 feet away from power lines and follow these safety tips: 1. Look up before planting or pruning trees and work at a safe distance by keeping yourself and tools at least 10 feet 2. Stay away from downed power lines and call if you see a downed line. Sep 21, Cutting down trees near power lines can be a dangerous and laborious task. If the tree’s branches are within 5 to 10 feet of a power line, many power companies require you to contact them before pruning or felling the tree. Hook a 3/8-inch cable as high as possible to the tree. Here are a few tips to avoid trees in wires: Look for power lines before pruning trees and large shrubs. If lines are anywhere near the tree, don’t attempt any tree Never climb a tree in order to prune it. Even if the wires aren’t currently touching the tree, remember that the tree’s Wearing. Asking city officials to remove a dangerous tree requires immediate action to avoid injury to passers-by and eliminate the threat of possible electrocution if the tree, or part of the tree, falls on overhead power lines, which could endanger both property and the general public.
<urn:uuid:8385ca41-e1c3-4341-a286-ddecf9739dd3>
CC-MAIN-2022-33
https://bushlopping.bar/tree-cant-fall-safely-power-lines.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.938801
519
3.125
3
Please write a learnng Dbrief for me with reference Page Dangerous offenders (DO) versus long-term offenders (LTO).Define both of these types of offenders. What is the difference between them? Which is more common, DO’s or LTO’s? In the Peter Whitmore case, he pleaded guilty in exchange for avoiding a DO designation. Do you think it was a mistake for the courts to allow his to do this? Defend your position Methodological issues surrounding risk assessment. Design a research study to measure risk assessment that involves the old methodology used in the 1970’s. Explain how violence would have been measured. Then, design a research study to measure risk assessment using the methodological advances described in the section entitled, Methodological Issues. How would violence be measured now? - Writer’s Choice (based on any open database you can find on the link in the instructions) - Analyze the importance of data management, knowledge management, and business analytics to business organizations. - Write a paper: Accounting and Financial Reporting - Ruby Whiteboarding - Business Plan - he Evolution and future role of forensic accounting in detecting and preventing corporate frauds - Types of Inflation and the Social Implications - Based on the information in the Interactive: Henry and Ertha Williams, answer the following for the discussion post this week. Groups will be assigned by the instructor. - Sociological imagination Essay introduction and planning - Infographic study - Energy Drink Sales Variables
<urn:uuid:89729bfb-25b4-4434-9221-ad5fa2490834>
CC-MAIN-2022-33
https://essayhelp101.com/2022/07/23/in-the-peter-whitmore-case-he-pleaded-guilty-in-exchange-for-avoiding-a-do-designation/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.910625
316
2.59375
3
Fuel is primarily refined from Oil. Each unit of oil produces 48 units of fuel per day. The effectiveness of this refining process can be significantly increased by researching fuel refining technologies. The economy laws below war economy reduce the effectiveness. Synthetic refinery buildings provide an additional source of fuel without requiring oil. They provide 48 units of fuel daily as a baseline (equivalent to one unit of oil) but this can be massively increased, with fuel and oil refining technologies (up to +250%). Their production is not negatively affected by economy laws. Finally each country has a small base production of fuel, 48 units per day. In contrast to strategic resources, fuel can be stockpiled. This allows countries to run a deficit in fuel for some time without immediately incurring penalties to its forces. As a baseline, each country can store 50,000 units of fuel plus 750 for every level of infrastructure in any of its states. Building fuel silos increases this capacity by 100,000 each, but they are vulnerable to bombardment and capture. Economy laws reduce the storage capacity to varying degrees. When capitulating a country, 50% of its fuel stockpile gets captured, 25% when annexing it. Depending on their mode of operation, units consume fuel proportional to their nominal fuel consumption as shown in the unit details. If they run out of fuel, they suffer severe penalties to their movement and combat abilities. Divisions need fuel if any of their combat battalions contain equipment that consumes fuel, such as trucks, half-tracks, tanks and self-propelled guns. These divisions are marked by oil barrels next to their name in the unit selection panel. The effective fuel use per day is 12 times the fuel usage shown in the division's stats. No fuel is consumed while standing idle and during strategic redeploys and naval transfers. It is doubled when fighting while moving at the same time. Each division has an internal storage lasting for 4 days of continued use. As long as the country has fuel available, they can refill via the supply system, at twice the normal consumption speed. If their supply zone is overloaded, the fuel flow is reduced and eventually stops at 50% overload. For example a supply zone providing 20 supply containing units requiring 30 supply will deliver no fuel at all to those units as other supplies take priority. When divisions fall below 25% of their internal fuel storage, they start to suffer increasing penalties, finally getting reduced to 40% movement speed and 10% battalion combat stats when no fuel is left. Training divisions earn no experience after running out of fuel. All aircraft use fuel while on missions (except rocket interceptors which don't run on oil-based fuel). The effective fuel use per day and aircraft is 8.4 times the nominal fuel usage shown in the wing's details. When only operating at day or night, the fuel consumption is reduced accordingly. |Nominal fuel usage||Daily consumption of 100 active aircraft| |0.2 (fighter, heavy fighter, CAS, NAV)||168| |0.4 (jet fighter)||336| |0.6 (strategic bombers)||504| |0.7 (jet tactical bomber)||588| |1.4 (jet strategic bomber)||1.176| Some mission types have non-standard fuel consumption: When running out of fuel, air missions receive a 75% mission efficiency penalty. The effective fuel use per day is 2.4 times the nominal fuel usage shown in the ship's stats. Ships have particularly high fuel consumption, so their mission assignments need to be carefully considered. Ships consume twice as much fuel while in combat but otherwise don't consume fuel when staying in position (whether in port or at sea). This includes task forces on naval invasion support and strike force missions while they have nothing to do. The training mission only uses 80% fuel. When ships run out of fuel they receive penalties of up to 75% to speed and range and 50% attack.
<urn:uuid:ab6216f6-2135-4c9e-8044-ffe5523d94cc>
CC-MAIN-2022-33
https://hoi4.parawikis.com/wiki/%E7%87%83%E6%96%99
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.935323
843
2.515625
3
Why is it called an emery board? Emery boards are small flat long objects which have emery or emery paper glued to them, making them both abrasive and flexible, used for fingernail and toenail care. They are used by manicurists to shape and smooth the nail during manicure and pedicure sessions. Is emery paper the same as sandpaper? What Is the Difference Between Emery Cloth and Sandpaper? Emery cloth differs to sandpaper in several ways: Emery cloth has the abrasive glued to a cloth rather than paper, which makes it far sturdier and less inclined to tear in use. Emery cloth uses a form of corundum (or corundite) as the abrasive, rather than sand. What is emery paper? Emery paper is a type of abrasive paper or sandpaper, that can be used to abrade (remove material from) surfaces or mechanically finish a surface. Operations include deburring, polishing, paint removal, corrosion removal, sizing, etc. Which side of emery board is coarse? This is a box of 144, short, double sided emery boards. One side has a coarse grit and the lighter side is a finer grit. What are the two sides of an emery board for? Emery boards are available with different grit sizes. This means that the grit on the surface of the file can be coarse or fine. The coarser side should be used initially, whereas the finer side should be used to shape the nails and for the finishing touches. What is the difference between nail file and emery board? Metal Nail Files While metal is a lot stronger and more durable than sand granules (the emery board), the metal used to make the files is usually of a lower grade and actually quite soft as far as metals go. But metal files just like emery boards also grind the nail and leave the nail tip exposed. Should I use a metal nail file? Metal nail files are a good option for very strong nails, like acrylics or those that have been painted with gel polish. If you have natural nails, this material might be too harsh, especially for long-term use. But if most nail files don’t have enough grit for you, this could be a great option. What is the best nail file to use on natural nails? The different types of nails files are designed for different uses, so it is important to select the right one. For natural nails, a fine-grit cushion file is gentle yet effective. Basically, the higher the grit number, the smoother the file. Coarse files (80-100 grit) are best for acrylic nail extensions. Can you use a nail file on a baby? A baby’s fingernails grow fast, so you may have to trim them weekly or even more frequently. Toenails don’t need cutting quite as often. Filing your baby’s nails with an emery board is the least difficult, safest way to do it, but it takes more time. Don’t use a metal nail file, which may be too rough for baby’s skin. What do you do if you cut a baby’s finger with nail clippers? Press the finger pad away from the nail to avoid nicking his skin, and keep a firm hold on his hand as you cut or clip. If you accidentally nick the skin, try not to worry. Gently hold a piece of clean, damp cotton wool on the cut and apply a little pressure . The bleeding will soon stop. Is it better to file nails or cut? Use a nail file for shaping, or if it hurts when you clip your nails. You don’t need to use it in just one direction, but do file gently to avoid damage. Fingernails should be given a curve, while toenails should be cut straight across, to prevent ingrowth. At what age can you cut a baby’s nails? When your baby is about a month old, his nails will have started to harden a little and will have a firmer free edge. This will make it easier to trim them using baby nail scissors or clippers with rounded ends, though you’ll still need to do this carefully. Why are baby nails so sharp? Newborn babies tend to have soft, flexible nails that grow astonishingly quickly and can get quite ragged and sharp. This means they can easily scratch themselves and even claw their faces, so you’ll need to learn how to keep your baby’s nails clean and short. Do babies have fingernails in the womb? Week 12: Baby’s fingernails form Twelve weeks into your pregnancy, or 10 weeks after conception, your baby is sprouting fingernails. Your baby’s face now has taken on a more developed profile. His or her intestines are in the abdomen. Are babies born with long nails? 13 Surprising and informative facts about your newborn. Babies’ nails grow very rapidly and need regular attention. If your baby was born after her due date, her nails might be quite long and sharp. Keeping them short helps prevent scratching of the face, which is common in small babies. Why do baby nails grow so fast? Why do nails grow so fast? Your baby’s nails are growing twice as fast as your own. Children’s metabolic rate is higher than that of adults so their skin cells (which make up nails) turn over more quickly, says Bernard Cohen, MD, director of pediatric dermatology at Johns Hopkins Children’s Center, in Baltimore. Are you born with nails? Nails themselves are made of keratin (say: KAIR-uh-tin). This is the same substance your body uses to create hair and the top layer of your skin. You had fingernails and toenails before you were even born. Do babies have blue eyes? Eye color isn’t set in stone until age 2. While only 1 in 5 Caucasian adults have blue eyes in the United States, most are born blue-eyed. Their irises change from blue to hazel or brown during infancy. Babies aren’t born with all the melanin they are destined to have. What is the rarest eye color? Which parent determines eye color? The chromosomes a child inherits carry genetic information that determines eye color. Differences in the copies received from each parent causes variations in the amount of melanin produced. A region on chromosome 15 has a big part in determining eye color. The OCA2 and HERC2 genes are located in this region.
<urn:uuid:48826516-121c-4f16-a44a-78bd5e9edde0>
CC-MAIN-2022-33
https://indielullabies.com/why-is-it-called-an-emery-board/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.946104
1,404
2.875
3
What is a visualiser? A visualiser, is also commonly known as a document camera (doc cam). In our teaching rooms, the visualiser is placed on the room lectern and allows documents or objects to be placed under the camera so that the image is projected onto a large screen. What are the benefits? - Many of our teaching spaces are unsuitable to have a whiteboard for lecturers to write equations etc and the use of a visualiser ensures that hand written documents can be easily shared with students. - Being able to display written documents etc on the classroom screen also ensures that students at the very back of the room can see what is being written. This is something that writing on a whiteboard may not enable. - Visualisers on the lectern also have the benefit of being able to write on a screen without the lecturer having their back to the audience encouraging more interactivity. - Content written will be recorded by the lecture capture system so that students can review later So that you don't have to learn how to use lots of different visualisers, we currently have just one type of visualiser in our centrally pooled teaching spaces. This is the AVerVision F50. You can find usage instructions in the link to the left. If the visualiser is closed, you can open it by gently pulling the head to the right hand side of the visualiser. This will release the head so that you can move it anywhere over the desk. If you would like a demonstration how to use these visualisers then please contact email@example.com.
<urn:uuid:424e2848-3586-4657-8817-25d996ec3e76>
CC-MAIN-2022-33
https://staff.hud.ac.uk/it/av/visualiser/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.938202
334
3.1875
3
Water softeners require a lot of salt. Salt is required for the water softening process to finish. Is this to say that softened water has an ocean taste? Is the amount of sodium in softened water harmful to your family’s diet? This article will address how salt is utilized by water softeners and how it affects the quality of your home’s drinking water. Salt Is Used to Regenerate Water by a Water Softener The resin in your water softener is made up of tiny, round beads that are stored in the bed of the water softener’s tank. The sodium ions on the coating of the resin beads naturally have a charge. The calcium and magnesium in hard water components, such as chalk and shellac, adhere to the resin via ion exchange when they fall onto it. Following are the steps in the process. The addition of salt to your softener creates a huge salty brine solution, which is utilized during regeneration. Rather than travelling through your pipes and appliances, the salt water displaces calcium and magnesium ions, allowing them to be washed down the drain instead. The sodium ions on the resin beads are then coated with salt so they can start the cycle again of collecting hard water minerals. How Salty Is Softened Water? A person requires a quart of water every day on average. That water, which comes from a properly operating water softener, has 75 to 100 mg of salt. According to nutritional information, just one serving of many common meals and beverages has sodium content that is considerably greater: - A slice of multi-grain bread has a total of 109 milligrams of potassium. - 8 ounces of almond milk contains 150 mg - 174 mg of cheddar cheese is in one slice. While the salt content in softened water is low, you may choose to filter it afterwards. To assist eliminate salt after the softening process, a drinking water filter may be connected to a home’s treatment system.
<urn:uuid:e1aa6dde-9f21-45d5-afe4-28fb04917f24>
CC-MAIN-2022-33
https://waterdistiller.com.au/how-salty-is-softened-water/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.945867
404
3
3
Self-Navigating Expert Learner Portrait of a Graduate: Self-Navigating Expert Learner Self-Navigating, Expert Learner demonstrates flexible, critical, and reflective thinking to show self-evaluation, goal setting, and self-motivating behaviors when learning. - Possesses the disposition, strategies, and desire to learn, unlearn, and relearn especially in an uncertain, ambiguous environment. - Demonstrates agility in thoughts and actions. - Skillfully transfers past learning into new situations. - Takes an active role in setting learning goals, uses strategies to achieve them, and reflects on the outcomes. - Shows strong understanding and belief of self to engage in reflection for individual improvement and advocacy.
<urn:uuid:f56d1e61-e627-41b2-bc8e-ae47e5a455fd>
CC-MAIN-2022-33
https://wiltonps.org/576014_3
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.849279
153
2.609375
3
The interesting thing about Bitcoin isn't what it is today. What's interesting is that this experiment is turning into a serious proving ground for the idea of "crypto-currency," digitally created currency protected by powerful cryptography. Crypto-currency is traceable, more portable than paper money, and harder to steal. If the Bitcoin experiment proves successful, how soon will a government or other regime develop, back, and distribute crypto-currency as a true alternative currency? My money, paper or virtual, says that day is coming. A particularly evolved regime could officially back a crypto-currency, issue some basic standards and regulations for use, and then continue to allow it to be community mined and distributed. You'd get the security benefits of decentralized production, the peer-to-peer buy-in of a barter currency, and none of the printing costs or insecurity of paper. On the other hand, a particularly devolved regime could do all those things but use the digital power of the currency to spy on its users, control or corrupt the flow of currency, or implement the tech insecurely and disrupt the global economy. A major move to crypto-currency could go either way, but I bet it's coming, nevertheless. First, let's get past the crypto-currency and Bitcoin objections. This technology is here to stay -- so let's take the arguments point by point. What about the gold standard? The first objection to Bitcoin, of course, is that it isn't backed by anything, so despite a trust and barter system, it's ultimately worthless. Let's be honest: The reason people are interested in alternative currencies in the first place is that it sometimes feels like the paper in your wallet and certainly the plastic are equally ephemeral. But let's assume we're talking about a centrally issued crypto-currency of the future: Problem solved. Backing would be ensured, but mining and distribution could remain decentralized to promote better security and code innovation. It's insecure: Anything can be hacked Yes, anything can be hacked. But it's worth noting that Bitcoin itself has never been hacked. In fact, famed hacker Dan Kaminsky said he tried to hack it and failed. Some of the technologies around Bitcoin, including some of the exchange sites, have been hacked, but never the actual currency algorithms. And paper money is also insecure. Thanks to a huge, fast-moving, and occasionally corrupt electronic trading market, billions can be lost in errant keystrokes, false tweets, or simple fraud. Plus, there are still good old-fashioned bank robberies: Did you know most people who rob banks actually get away with it? Not exactly confidence-building. A crypto-currency may be hackable, but it can also be really, really, really hard to hack -- harder than robbing a bank. And if mining and exchanges remain decentralized despite a central backing body, you'll see hacks that may sound major but actually do minor damage to the entire currency pool. Plus, digital currency has traceable transactions. It can even have traceable code embedded during the mining process. So to discourage or respond to theft, a regime could blacklist or poison stolen currency, rendering it useless and possibly even using blacklisted code to find thieves. Bitcoin proper isn't likely to come with a blacklisting scheme. It's unregulated and blacklisting would be tricky at best -- its community would have to agree on a set of standards that would trigger poisoning specific coins. It could end up punishing innocent users, and it can be technically difficult to track stolen coins, thanks to services called "mixers" that mix coin code and effectively launder Bitcoins. But blacklisting is still technically possible; it's quite easy to imagine a centrally issued crypto-currency having a set of standards and chain-blocking to both trace stolen currency and prevent its use. To be clear, I'm not advocating this usage, and there are plenty of good arguments against it, but I can imagine it being appealing to banks and governments that might decide that security and currency tracking are more valuable than fungibility. It's just a techie experiment It's easy to dismiss Bitcoin or crypto-currencies as the flailings of a disaffected, semi-anarchist hacker community trying to undermine the system. But you know what? Hackers created the Internet, and the decidedly anti-establishment Steve Jobs gave us the modern technology era we know and love today. A lot of good ideas started out as techie experimentation. Plus, and more saliently, I have it on good authority that the U.S. government and others are very, very interested in Bitcoin -- so much so that there are nascent attempts to regulate it and federal authorities and lawmakers have been warning about its nefarious nature for a couple of years now. Crypto-currency is a certifiable Pretty Big Deal. The Facebook antagonists otherwise known as the Winklevoss twins have amassed huge sums of Bitcoin; it's minting its own millionaires (in real dollars); and an increasing number of global citizens consider Bitcoin a better investment than Wall Street these days. You don't have to buy it -- literally or figuratively -- but Bitcoin is already changing the world, and I have a feeling the real changes are just beginning.
<urn:uuid:43e062de-ed4b-42a7-95ef-db3305188428>
CC-MAIN-2022-33
https://www.cnet.com/culture/heres-why-bitcoin-is-the-future-of-money/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.955459
1,076
2.5625
3
ALONG the craggy, rain-pelted coast of the Olympic Peninsula, the Makah people survived for centuries by harvesting the ocean's bounty. In part, they subsisted on whales, hunted in dugout canoes. A harpooner would dive into the water to make the kill with a final lance thrust. Now, almost 70 years since they last hunted the massive marine mammals, the Makah tribe wants to return to the tradition. ''We've sat here and watched the [gray] whale come back'' from being an endangered species, says Jerry Lucas, a member of the Makah Tribal Council in Neah Bay, Wash. With unemployment as high as 50 percent and alcohol and drug abuse rampant among the 1,000 residents of the Makah Indian Reservation, Mr. Lucas says he hopes whaling can help revive community spirit and fight these problems. ''Everybody has to work together'' to bring in a whale and make use of its meat, blubber, bones, and baleen for food and for traditional crafts and ceremonies,'' Lucas says. Although the Makah's goal is modest - harpooning five gray whales annually out of a population of more than 20,000 - environmentalists are concerned that this could be the beginning of the end of gray whales in the Northwest. Their worry is twofold: that renewed ''subsistence'' whaling could be a first step toward commercial whaling, and that one tribe's action may lead others to assert similar rights, boosting the whale harvest dramatically. Will Anderson, a spokesman for the Progressive Animal Welfare Society in Lynnwood, Wash., says other tribes nearby may push for a more liberal interpretation of their treaties. In British Columbia, Canada, several tribes with whaling in their past are already negotiating their first treaties with the Canadian government. The Makah are in a strong position to pursue their claim because of a 1855 treaty that specifically reserves ''the right of ... whaling or sealing at usual and accustomed grounds.'' Other tribes have treaties that typically refer to fishing in general without specific reference to whales. But Mr. Anderson's group and the Sea Shepherd Conservation Society of Marina Del Rey, Calif., oppose any whale hunting by the Makah unless the tribe wins permission from the International Whaling Commission, of which the United States is a member. The US government will bring a Makah request before the IWC at the commission's annual midyear meeting in 1996. But the tribe says the treaty gives it the right to hunt whales, period - regardless of the IWC ruling. The Whaling Commission sets annual quotas for Alaska's Inuit and other indigenous peoples who depend on whales for subsistence, but some question the validity of the Makah claim. Anderson and Sea Shepherd leader Paul Watson are marshaling evidence questioning tribal claims that gray whales were a staple of Makah diet. Mr. Watson says Sea Shepherd vessels may try to intervene if the Makah start hunting whales in 1996, as is currently planned, prior to an IWC decision. ''If it gets down to a confrontation between the US Coast Guard and Sea Shepherd, then so be it,'' says Watson, claiming that the IWC reflects a higher law than any single nation's. The Whaling Commission has no enforcement body of its own. Watson says it would be ''racist'' to treat one group, the Makah, as uniquely exempt from the IWC. Complicating matters for whaling opponents is the support the Makah have from many scientists and environmentalists. Greenpeace, while decrying commercial whaling, has no quarrel with the subsistence request. And while some say hunting could drive the friendly 45-foot creatures away from whale-watching boats, biologist John Calambokidis says, ''I can't imagine hunting efforts aimed at five animals ... would affect the behavior'' of the whole migrating group. ''If anyone has the right to hunt these animals, it's these people,'' Mr. Calambokidis adds. The Makah have pledged to modernize their hunting methods - such as using exploding-head harpoons, in order to be more humane and safe. Calambokidis supports last year's move to delist the gray whale as an endangered species. Anderson disagrees. ''You wouldn't think a city of 21,000 people is very big,'' he says. Grays are the only whales that feed directly off the ocean bottom. And he and Watson each allege the Makah have a hidden agenda of commercial whaling. Lucas says he ''can't see that happening'' while he is on the Tribal Council. But, noting the tribe's long tradition of trade, he adds, ''I'm not going to say [what may happen] in the future.''
<urn:uuid:4333735f-0059-4932-92ac-d8eba48c0fbd>
CC-MAIN-2022-33
https://www.csmonitor.com/1995/0725/25032.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.944469
968
3.375
3
Road transport is by far the dominant carrier of freight and passengers in Ghana’s land transport system. It carries over 95 percent of all passenger and freight traffic. Most communities, including the rural areas are accessible by road transport. The roads are classified under three categories: trunk roads, urban roads and feeder roads. The Ghana Highway Authority, established in 1974 has responsibility for developing and maintaining the country’s trunk road network totaling 13,367 km, which makes up 33 percent of Ghana’s total road network of 40,186 km. There are railway service connections in Accra, Kumasi, and Takoradi, and the major mining areas, to the sea ports.
<urn:uuid:f4a41bfc-eea1-415f-ad1f-96f8110d6e1f>
CC-MAIN-2022-33
https://www.pef.org.gh/index.php/en/content-classification/itemlist/tag/transport%20in%20ghana
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.949214
139
2.890625
3
There are many ways of measuring how hard we’re working when we run. Pace is the most common: to go fast, we need to push harder – that’s easy enough to understand. Pace, however, may not always be the best indicator of your running intensity. Think of running uphill: it takes more effort, but pace is slower. The good news is there’s a new metric that can help monitor your effort more accurately. That’s running power. In short, running power measures, in Watts, the effort required for every segment of your run. The higher the Watts, the more power you’re generating with every step. In other words, this metric is used to quantitatively and more objectively measure how much energy runners use during different conditions and time points in their run. Of course, talking about power isn’t new. Cyclists have been doing it for decades. So considering how crucial power meters can be for cyclists, it’s not surprising that runners are starting to catch on as well. Using this additional form of data can definitely benefit runners, and it takes some of the remaining guesswork out of your training and racing. If you already know your pace, your heart rate, and your distance covered, bringing power into the equation – literally – can monitor that data even more precisely. Here’s what runners should know about running power – and why tracking more than distance and heart rate just may change the game (or at least your next big race). What is running power? Essentially running power is the measurement, in Watts, of how much work you’re putting in while you run. We produce power as we run. Most of this power supplied by muscles is converted to heat and the small fraction that doesn’t turn into heat, propels us forward. That’s called mechanical power, or in this case, running power. Power indicates how much force and speed a runner is exerting at any given moment. In other words, power is just how much you’re doing and how fast you’re doing it. Running with power For runners, power is a phenomenal metric to monitor how hard they are working during every segment of a run whether you’re running on the flat or uphill. This way, it complements more common metrics like heart rate and pace because power tracks the actual work output of every step rather than your heart’s response, or the speed (pace) resulting from the work needed to produce the output. Let’s take a look at a couple of examples. Heat, altitude, or your energy levels are factors that can affect your heart rate and make your heart beat a little bit faster than usual while running. If this happens, you may think you’re working your butt off, and your heart rate may be skyrocketing, but looking specifically at power numbers can tell otherwise: despite your heart beating faster, your power output might be no different than any other day running the same segment at the same pace. Similarly, when you run uphill, your pace slows down and you need to generate more power to propel you forward – that’s the battle against gravity. In this situation, power rather than pace can tell the actual intensity of your run. Using power as a measuring factor during your runs can help you make real-time effort-based analyses – measured in watts – that’ll help you reach your peak performance. You may think you’re working your butt off, and your heart rate may be skyrocketing, but looking specifically at power numbers can help you understand how hard you’re truly working and how that relates to your fullest potential. SAME PACE, DIFFERENT POWER Running, unlike cycling, is greatly affected by the biomechanics of the athlete, so insights into the biomechanical economy of the runner can be measured. This way, any technical changes the runner makes can be objectively evaluated for performance. - Two athletes can run at the same pace, with entirely different power. - Or two athletes can run at the exact same power, and same body mass, but at entirely different paces. For a runner to move they must push a force into the ground through their legs and feet, to lift their body up into the air. This airborne lift is required for running, but if a runner goes too far up in the air, it’s not conducive to running forward very fast. Work is still being accomplished, but it’s moving upward, instead of forward. The movement can also be lateral. A change in technique that a runner makes, can suddenly be more effective at transferring their efforts forward. Foot-strike, upper body position and many other small changes in running technique can take the same power output and make it faster. How Does running power HELP? The upside to using power as a training tool is that understanding even more about your body can make you perform better. It can help you see how efficient you are during your workouts, which can help you (or your coach) tweak your training, form, and technique accordingly. You may find that you’re outputting more power at a lower heart rate, which is usually an indicator of increased running efficiency. Thus, in the long run, by tweaking your form you may actually perform more efficiently. Plus, power takes into consideration not just heart rate and pace, but also your rate of perceived effort. Having more data on hand – like your functional threshold power and your VO2 max – equals smarter training and, in most cases, better results. RUNNING POWER AND THE BATTLE AGAINST GRAVITY Running power is a better measure of intensity than pace typically is. For example, your power can stay the same when going uphill, but clearly if you kept the same power on the uphill as the flat, the uphill portion will be slower. However, you’re working the same effort and intensity, despite the slowing of the pace due to the battle against gravity now being prominent. The opposite is also true when running downhill – the pace will likely increase greatly but your work rate is lower as gravity is the force placed on the body to pull it down the hill. So, even though pace increases, your effort and intensity decreases. Therefore, pace is not effective for measuring intensity, especially on hilly courses. Also consider interval workouts, where you do a certain distance or time, either on a course or track. Yes, you might run fast on the interval, but you’re not sustaining that pace the whole time, you’ve added in recovery periods. Pace for the workout will be affected by the recovery periods where you’re standing around, walking or jogging extremely slow. If it’s a course with hills, you’re adding to the variation of pace. Power is much more effective than pace to account for variations with rest intervals or hills. RUNNING POWER AND HEART RATE DATA Combining running power and pace with heart rate data offers unique opportunities for runners. The advantages this provides is the opportunity to see where a small change in power can lead to a big jump or decline in heart rate. This type of data becomes very helpful in hot conditions, or longer race efforts where pacing is challenging and critical. As athletes begin to collect more heart rate and power data on themselves, this relationship and the key points of exponential change can likely become more clear, and training and racing strategies can be devised to maximize this. If you notice a certain heart rate required to hold a common aerobic power value while running, then you’re seeing aerobic economy fitness improvements. This is much more objective than pace/heart rate comparisons, as pace can be affected by hills, or even GPS error. With power, you can run at a steady workout, even if going uphill, without the slowing of pace affecting the ratio of power/heart rate. With power, you can run at a steady workout, even if going uphill, without the slowing of pace affecting the ratio of power/heart rate. Related: Power vs. Heart Rate LET POWER GUIDE YOUR RUNS Polar introduced the world’s first wrist-based running power in 2018 with the Polar Vantage V multisport watch. Since then, many of our watches, including Polar Vantage V2, Polar Grit X Pro and Polar Pacer Pro, can measure power directly from the wrist. You can use this metric to guide your runs by following the different power zones. Using this feature is simple, not much different than looking at any other running metric. You can set up different training views for running workouts, including power metrics to see your power output, in Watts, at any moment of your run. Your watch will display maximum power, average power, lap power, and more. It can also show your current power zone, so you always run at the right intensity. Next, let’s see how to set up your running power zones to guide your training sessions. FIND YOUR MAXIMAL AEROBIC POWER Just like heart rate training, training with running power is based on power zones that can be determined by using maximal aerobic power (MAP). If you don’t know your maximal aerobic power, but you know your VO2max, you can update it to Polar Flow under “Physical settings” and we’ll estimate your maximal aerobic power based on your VO2max. There’s also a test to estimate your maximal aerobic power: - Because MAP can be sustained on average for 6 minutes, you can estimate it with a 6-minute time-trial run. - To complete the test, run as fast as you can for six minutes. - After finishing the test, look at your average power which equates to your MAP. - Then update your MAP in your power zone settings. Once you’re all set, it’s time to look at the different power zones. SET UP YOUR RUNNING POWER ZONES There are five power zones to help you achieve your training goals. ZONE 1: 55%–70% OF MAXIMAL AEROBIC POWER - This zone is for easy runs or recovery sessions. Running in zone 1 builds up your basic endurance. ZONE 2: 70%–85% OF MAXIMAL AEROBIC POWER - This is the marathon running zone. You should be able to maintain this level continuously for up to one hour. Alternatively, you can split your training into e.g. 4 x 1.6 km intervals. - Zones 1 and 2 are the bread and butter of your training. You should aim to spend most of your training in these zones. If you’re racing and your distance includes running in zone 2, reduce training in this zone during the competitive season. ZONE 3: 85%–100% OF MAXIMAL AEROBIC POWER - Improves your maximal oxygen uptake (VO2max). In this zone, you should be able to complete 4–6-minute interval runs. - Zone 3 is for your training season. Include it in your training program for one month at a time. ZONE 4: 100%–115% OF MAXIMAL AEROBIC POWER - Use this zone for long interval runs (150-600 m) that create a burning sensation in your muscles (as an indication of lactate accumulation). - Zone 4 is for experienced runners who prepare for competition. For the rest of us, it’s okay to be in zone 4, but a burning sensation in your muscles can strip the fun out of running. ZONE 5: MORE THAN 115% OF MAXIMAL AEROBIC POWER - Improve your maximal power production in short interval runs (< 150 m). - Zone 5 is safe for all, but it may be difficult to achieve when running on flat terrain. A good alternative is to do uphill running sessions where reaching zone 5 is easier. MEASURING RUNNING POWER FROM THE WRIST With wrist-based running power measurement, you don’t need a separate foot pod or power meter – your sports watch automatically measures power from the wrist during your runs. Being able to look at your watch and see your running power numbers is particularly useful for interval training and hill running. Interval training is effective and fun. However, to avoid bad habits, bear in mind the following advice. During interval training, you should hold your running power constant between the intervals, or even slightly increase power towards your last run. This way you won’t be at the limits of your strength and will be able to maintain the correct running technique, which will help you avoid running injuries. Note that your heart rate may increase as you progress towards your last runs (as in the example below). This is normal and depends on the length of each workout and recovery interval. Example. Heart rate and interval training with constant (good) or decreasing (bad) power. OBTAIN MAXIMAL POWER: RUN IN HILLY TERRAIN To obtain maximal power, you need to activate as much muscle mass as you can. This is easier if you run against a positive slope. You can’t attain maximal power when you run on flat terrain, not even at maximal speed. Running downhill forces your muscles to produce more force than running uphill. Thus, although you produce less power downhill than uphill, downhills put more stress on your muscles. Although you produce less power downhill than uphill, downhills put more stress on your muscles. This may lead to muscle pain 24-48 hours after training (known as delayed-onset muscle soreness), but that pain is harmless, and your muscles potentially become more fatigue resistant. Overall, running in hilly terrain is a good alternative for all runners and poses a different kind of stress to muscles than running on flat ground. TRY RUNNING POWER Yourself WITH POLAR PACER PRO Running power has been available in Polar watches for some time. The latest model to include a built-in power meter is Polar Pacer Pro, our latest addition to our family of running watches. Every aspect of Polar Pacer Pro has been engineered for an unrivaled running experience. With the inclusion of running power, Polar Pacer Pro has all the features you need to fine-tune your training and become a better runner. Want to know more about Polar Pacer Pro? Here’s everything you need to know about the Polar Pacer Series. If you liked this post, don’t forget to share so that others can find it, too. Or give it a thumbs up! I like this article Please note that the information provided in the Polar Blog articles cannot replace individual advice from health professionals. Please consult your physician before starting a new fitness program.
<urn:uuid:8700de3d-789e-4111-85c6-256617de06e5>
CC-MAIN-2022-33
https://www.polar.com/blog/running-power/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.931014
3,109
3.28125
3
Non verbal Communication Starter Activities KS2 English Teaching Resources: Non-verbal communication contains a number of fun tasks and activities that work great as starters to get your lessons up and running. As with all our powerpoints, the resource is fully editable and can be changed, tweaked and edited to suit your teaching needs. This 20 slide PowerPoint resource comes with a 26 page booklet of worksheets which accompany the presentation. To preview KS2 nglish Teaching Resources: Non-verbal communication starter activities click on the images from the PowerPoint slides.Our Price : £2.99 / 3 Credits
<urn:uuid:1a5d3812-a718-426a-92f3-5b4d7619a820>
CC-MAIN-2022-33
https://www.teacher-of-primary.co.uk/non-verbal-communication-starter-activities-teaching-resources-1221.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.85799
120
3.796875
4
Smog and particulate matter (such as pollen, soot, and dust) are examples of air pollution. Children's lungs are especially sensitive to the harmful effects of air pollution, because they breathe rapidly and inhale a high concentration of pollution relative to their weight. Use care when you take your young child outdoors, especially for physical activities. When children exercise, they breathe more heavily than normal. Also, they breathe more through their mouths than their noses. This allows pollution to be inhaled more deeply into the lungs where it can cause permanent damage. Do not take your child out when the air quality index is 151 or above.footnote 1 This index is often reported in the news. You can also find it at http://airnow.gov. Go outside early in the morning in the summer and on days where smog may develop. On days that air is stagnant and temperatures reach over 90°F (32°C), smog levels usually peak in mid-to-late afternoon. Medical Review:John Pope MD - Pediatrics & Kathleen Romito MD - Family Medicine Environmental Protection Agency (2011). Air Quality Index (AQI): A guide to air quality and your health. Available online: http://airnow.gov/index.cfm?action=aqibasics.aqi.
<urn:uuid:daf2f1c7-bcc3-4b6a-a222-a2fabd945fc2>
CC-MAIN-2022-33
https://www.uofmhealth.org/health-library/ue5159
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.904654
323
3.609375
4
Tech Innovator And Master Of Maps Dies At 80 ROBERT SIEGEL, HOST: If you've ever used something like Google Maps or a GPS device, thank Roger Tomlinson. He's widely regarded as the father of GIS, that's geographic information systems, the technology behind electronic maps. Roger Tomlinson died Sunday at the age of 80. Georgia Public Broadcasting's Adam Ragusea has this remembrance. ADAM RAGUSEA, BYLINE: It's hard to overstate how important this British-born geographer was to his field. But when I interviewed him last year, it didn't feel like talking to the father of an industry. More like a puckish grandfather. (SOUNDBITE OF ARCHIVED BROADCAST) RAGUSEA: Tomlinson was 27 when he went to work for an aviation company in Canada in 1960. Government aid workers there wanted to build pulp and paper mills for Kenya, which was just emerging from British colonial rule. Tomlinson's company had already done aerial surveys in Africa, so the Canadian government hired them to figure out the best location for timber plantations to feed the mills. : You sort of needed the right soil. Slope is important. You can't put plantations where you can't easily harvest them. RAGUSEA: To think about all this at the same time, Tomlinson needed to build what he called a sandwich of the topographic and climate maps he had. At the time, this would have been done by printing the maps onto huge transparencies, stacking them on a light table and then looking down through them. But this was an aid project for a developing nation, they didn't have the budget for that. : And so I thought, if we could turn a map into a bunch of numbers, and the map on top into another bunch of numbers, and get the computer to compare those two bunches of numbers, then we've got something. WIL COWART: GIS is important because it gives us a tool for not just seeing where things are, but how things interact. RAGUSEA: Wil Cowart is the GIS specialist for the water authority in Macon, Georgia. He says looking at maps of pipes in a computer doesn't just let him see where the houses are above. He can watch the water move - something you couldn't do on a transparency. COWART: So then we can start doing network analysis that says, what happens if this line breaks? Which individual customers are going to lose water if we close this valve? RAGUSEA: Today, thousands of GIS professionals are in government and industry worldwide, and they're all walking in Roger Tomlinson's shoes. Esri, the GIS software giant where Tomlinson was a consultant, says in a statement, quote, "he was an inspiration to generations of geographers, cartographers, scientists and anyone who understood the importance of location-based analysis." For NPR News, I'm Adam Ragusea, in Macon, Georgia. Transcript provided by NPR, Copyright NPR.
<urn:uuid:62afacd1-9cc8-493c-b2b8-41ebdde65396>
CC-MAIN-2022-33
https://www.wesa.fm/2014-02-13/tech-innovator-and-master-of-maps-dies-at-80
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00288.warc.gz
en
0.960958
651
2.84375
3
History: BoKaap’s character started emerging during the period of 1790 and 1840. The houses are characterized by either Dutch or British influences. The earlier houses are situated along lower BoKaap between Dorp Street down to the foreshore. Houses are mainly semi-detached but free standing homes can also be found. The people who settled in BoKaap were craftsman, free traders and freed slaves. |>> Read more history >>| Facade: The Facade of the houses is what charms visitors the most. The entrance to the houses are elevated from the streets. Parapet’s and cornices of various shapes can be found. In the standard Bokaap house the facade would end at the top in the parapet, a molded cornice will be found directly below that. The parapet is sometimes raised to a central point, but is normally straight. Shape of houses: The typical Bokaap house was usually about six meters wide. L-shaped house are also found and have either a small yard or garden. Narrow passages serve as alley ways separated houses and provided entrances to the back of houses. An unmistakable uniqueness about Bokaap houses is the ” stoeps” (front porches). The height of the stoep is usually elevated from the streets and built up from solid bricks finished with tiles or “klompjes” which is a hard brick from the Netherlands. Some stoeps have iron railings. But the stoep best serves the purpose of being a place where family and friends meet and socialize. In the old buildings of the Cape yellowwood, stinkwood, teak and pine were imported from Norway Indigenous Timber was scarce. The windows of the older houses of Bo Kaap consisted of teak and in later years they used pine. The styles of windows either followed the Cape Dutch, Georgian or Victorian style. The Cape Dutch frame was one big piece of timber. The Victorian style frame was a frame which consisted of many divisions. The windows and external frames were normally painted green while the teak was not painted but oiled. |Door: The Cape Dutch style of houses was famously characterized by the two paneled doors. This was a door divided into two parts horizontally allowing the top section to be open while the bottom section could be closed. The Georgian style was a double door consisting of either six or eight panels divided in the middle. The outside doors were commonly painted green while the teak which they used as timber were oiled. According to the Cape Dutch style the inside of the doors were not painted and usually had single paneled doors. These panels and the frames were made of yellowwood with rails made of teak. These doors usually have two to four or six panels each. FloorBefore the nineteenth century timber was also scarcely available for flooring. Hence some floors were made of peach-stones and clay. When timber was more available yellowwood was used. It was mainly used for front rooms. The kitchen and backrooms had floors made of concrete with vinyl tiles. Ceilings were either made of teak boarding or the underside of yellowwood. Staircases were normally made of teak. The problem encountered with roofs was their durability against fire, wind and water. When roofs were being built in Bokaap yellowwood was used for this purpose as well. First they built the yellowwood on top of thick beams, then had a layer of crushed bricks which were concealed with three coats of shell lime and crushed and burnt shells. When there was a leakage they used train oil, tar or paint to repair them. In the 1850’s corrugated iron was used. The Moslem Cafe in Rose Street was different to the normal roofs since after the usual brick layers it was finished with shell-lime and sea-shell in addition to a layer of corrugated iron being laid over that. Brick: The bricks used were made of clay which was sun-dried and made in wooden moulds. Kiln-built bricks were more expensive than bricks. The hard-burnt bricks from the Netherlands were used for steps and the edges of stoeps. Thereafter the English brick was imported which was red in colour. Stone: The local stone of Signal Hill was used for the foundations of Bokaap houses. Foundation: Foundations were mainly made of stone rubble in mud mortar layered on the bedrock. Lime mortar served as a barrier against dampness. Shell-lime, which was burnt sea shells also served as a barrier. Because shell-lime was scarce clay mortar was used for wailing and foundations but were not very water proof. Stone or brick walls were usually finished off with paint made of shell-lime or lime wash. Tallow or oil were considered to be good for walls. The surface of walls were never flat and were plastered with clay which was mixed with water. Thereafter lime, limestone, slaked and mixed sand were used. Chicken wire served as a means of binding old and new bricks together. Cement was imported from 1816. Portland cement was the best-suited cement to be used since it was more water resistant and set quicker than lime. Tiles: In Bokaap Malmesbury shale was used to pave the courtyards and stoeps. Window Glass: All the window glass were imported from Europe and was about 200x150mm in measurement. Metalwork: All the iron used for railings, locks, hinges, door handles of brass, escutcheon plates and bolts were imported from Holland.
<urn:uuid:b1af8478-a289-4999-8451-9a0d98059cf0>
CC-MAIN-2022-33
http://www.bokaap.co.za/architecture-of-bo-kaap/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00288.warc.gz
en
0.987903
1,179
3.125
3
This bridge is noted for having two spans, each built by a different bridge company. The southern span was built by the Brackett Bridge Company of Cincinnati, Ohio in 1892 and the northern span was built by the Lafayette Bridge Company of Lafayette, Indiana. The story behind why the bridge is configured as such is unknown, whether one of both spans were moved here from another location, or whether the 1896 span was built to replace a damaged or destroyed 1892 span. Information and Findings From DHPA Historic Bridge Survey Statement of Significance The Brackett Bridge Company of Cincinnati, Ohio, and the Lafayette Bridge Company of Lafayette, Indiana, each fabricated one span of this pin-connected Pratt through truss which is seated upon cut stone abutments, wingwalls, and pier. Brackett's span to the southwest was probably constructed in 1892. Intermediate verticals of laced channels subdivide the 87' span into most of its five panels. Eyebars provide the diagonals: pairs stretch toward center span from the top panel point to the bottom of the 2nd and 4th panels; pairs of cylindrical eyebars with turnbuckles cross the center panel. Girder floor-beams are U-bolted to the lower pins. The Lafayette bridge span was added in 1896. Again, intermediate verticals of laced channels subdivide the 78'9" truss into most of its five panels. The diagonals follow the standard design used by Brackett, too. U-bolted to the lower pins, I floor-beams carry the 15' timber deck which serves each span. 14'7" of vert clear One span fabricated by a prolific out-of-state and another by an equally prolific in-state firm, this structure retains its 19th century members including decoratively latticed portals and bracing for each span. It includes the oldest and one of two extant Brackett Pratts. References AECON, Inc., Bridge Inventory and Inspection Report: Crawford County (Nashville, 1973). Simpson Engineering Corp., Bridge Reinspection Report: Crawford County (Indianapolis, 1980). WTH Engineering, Crawford County Bridge Reinspection Report (Indianapolis, 2001). bridge nameplates. Bridge Considered Historic By Survey: Yes Coordinates (Latitude, Longitude): Search For Additional Bridge Listings: © Copyright 2003-2022, HistoricBridges.org. All Rights Reserved. Disclaimer: HistoricBridges.org is a volunteer group of private citizens. HistoricBridges.org is NOT a government agency, does not represent or work with any governmental agencies, nor is it in any way associated with any government agency or any non-profit organization. While we strive for accuracy in our factual content, HistoricBridges.org offers no guarantee of accuracy. Information is provided "as is" without warranty of any kind, either expressed or implied. Information could include technical inaccuracies or errors of omission. Opinions and commentary are the opinions of the respective HistoricBridges.org member who made them and do not necessarily represent the views of anyone else, including any outside photographers whose images may appear on the page in which the commentary appears. HistoricBridges.org does not bear any responsibility for any consequences resulting from the use of this or any other HistoricBridges.org information. Owners and users of bridges have the responsibility of correctly following all applicable laws, rules, and regulations, regardless of any HistoricBridges.org information.
<urn:uuid:6a12a2e8-6c9e-48a5-a051-c47f307ea2f0>
CC-MAIN-2022-33
https://historicbridges.org/bridges/browser/?bridgebrowser=indiana/archibaldfallsbridge/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00288.warc.gz
en
0.927759
729
2.65625
3
I used to think I was the only person who might mess up Lanuvium and Lavinium. NOT SO! Apparently Dionysius of Halicarnassus made the same mistake when he told this story: While Lavinium was building, the following omens are said to have appeared to the Trojans. When a fire broke out spontaneously in the forest, a wolf, they say, brought some dry wood in his mouth and threw it upon the fire, and an eagle, flying thither, fanned the flame with the motion of his wings. But working in opposition to these, a fox, after wetting his tail in the river, endeavoured to beat out the flames; and now those that were kindling it would prevail, and now the fox that was trying to put it out. But at last the two former got the upper hand, and the other went away, unable to do anything further.5 Aeneas, on observing this, said that the colony would become illustrious and an object of wonder and would gain the greatest renown, but that as it increased it would be envied by its neighbours and prove grievous to them; nevertheless, it would overcome its adversaries, the good fortune that it had received from Heaven being more powerful than the envy of men that would oppose it. These very clear indications are said to have been given of what was to happen to the city; of which there are monuments now standing in the forum of the Lavinians, in the form of bronze images of the animals, which have been preserved for a very long time. Why should we assume he’s wrong? Or at least that the attribution of this prophecy is disputed? Whelp. The obverse of the above coin looks like this: That’s Juno Sospita, the patron goddess of Lanuvium! The moneyer’s family is well known for celebrating their connection to this city on their coins. If there was a statue that looked like the reverse, it probably stood in that forum, not at Lavinium. Add in this tantalizing bit of Horace: And we can be pretty sure that Lanuvium that claimed the she-wolf and by extension the eagle as prodigies of its foundation. It’s also a nice example of the wolf as a non-Roman, but still Latin, symbol, one that is morphed into a proto-Roman symbol through its alignment to the Aeneas narrative. Pity its too late for the book. Thank goodness for this blog as a thought dumping space. [Refs found at Crawford 1974: 482]
<urn:uuid:ef8e389c-e531-4ce2-928a-9c4d2a39a29e>
CC-MAIN-2022-33
https://livyarrow.org/tag/eagle/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00288.warc.gz
en
0.987784
539
2.515625
3
Why does Niger have the worst education system? In its current state, Niger’s students lack the support and opportunities they need to fully thrive. Poverty and poor access to schooling both contribute to the struggling educational system in place. The low attendance rates correlate with the high number of child marriages in Niger. Why is Nigeria’s literacy rate so low? Education quality is a big problem, with Nigeria performing worst out of 22 sub-Saharan and North African countries rated by the World Bank in 2008. The main contributing factors are poor physical facilities, inadequate sanitation, lack of textbooks and the number of unqualified teachers. What is the literacy rate for Niger? Does Niger have health care? The health system is under-resourced. More than 50% of the population does not have access to health services. The quality of available health services and their coverage are both severely limited. Public health programmes are overstretched. What is school like in Nigeria? With the introduction of 6-3-3-4 system of education in Nigeria, the recipient of the education would spend six years in primary school, three years in junior secondary school, three years in senior secondary school, and four years in tertiary institution. How is education in Nigeria? Nigeria’s education system is based on the (1)-6-3-3-4 formula: one year pre-primary education, six years primary, three years junior secondary, three years senior secondary, and a minimum of four years tertiary education. Millions of Nigerians are half-educated, and over 60 million – or 30% – are illiterate. Which state is more educated in Nigeria? List by UNESCO (2012) |Rang||State||literacy rate (in %)| Where does Nigeria rank in education? What are the three levels of education? Education levels All courses and programmes at universities and university colleges are divided into three levels: bachelor’s (first cycle) master’s (second cycle) doctoral (third cycle) Which country has the highest education? 10 most educated countries in 2020 by population - Norway. Tertiary: 43.21% Upper Secondary: 38.76% Below Upper Secondary: 18.03% Population 2020: 5,421,241. - Finland. Tertiary: 44.30% Upper Secondary: 43.80% Below Upper Secondary: 11.90% Population 2020: 5,540,720. - United Kingdom. - United States. - South Korea.
<urn:uuid:7447ab7b-18b7-471e-b847-351fc6a8e4ff>
CC-MAIN-2022-33
https://norman-restaurant.com/why-does-niger-have-the-worst-education-system/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00288.warc.gz
en
0.935811
593
2.59375
3
Before the advent of modern technology, it used to be the case that the only way a doctor could gain any insight into his or her patient’s condition was to schedule an in-person appointment and perform an exam. Although healthcare facilities have had the ability to use telemedicine in some capacity since the 1950s, it is only in recent months that the technology has been truly put to good use. Read on to find out about how telemedicine carts can help doctors care for their patients. Virtual Visits Facilitate Quick Diagnoses Telemedicine allows patients who live in remote areas far from medical centers and physicians’ offices to schedule emergency appointments online without having to leave the comfort of their own homes. When serious health concerns come up, the ability to diagnose them quickly and accurately can make a life-or-death difference. The right Telehealth Equipment, including not just telemedicine carts, but also peripheral equipment like cameras and scopes, allows healthcare providers to diagnose urgent health problems remotely, which can be a literal life-saver for patients who live far from medical care. Telemedicine Protects Physicians’ Health Since the outbreak of the novel coronavirus COVID-19, healthcare workers across the country have been placing themselves in danger to provide care for severely ill patients. Each time a doctor falls ill, he or she must self-quarantine for at least two weeks, which not only threatens the health of the doctor but also removes one more qualified physician from the pool of available medical personnel. Telemedicine carts allow doctors to perform remote exams of potentially contagious patients in a clinical setting to provide an accurate diagnosis and ensure proper care without jeopardizing doctors’ health. Recommend Appropriate Actions Using telemedicine to pre-screen patients before they head to their doctors’ offices or local hospitals for care also provides protection for other patients. If a patient believes he or she may have COVID-19, to return to a uniquely pertinent example, taking advantage of telemedicine technologies allows him or her to get an accurate symptom assessment before entering a doctor’s office. If the doctor performing the remote exam believes the patient may be infected with a contagious disease, he or she can recommend appropriate actions to protect the health of others before an in-person examination. If the doctor provides a positive diagnosis but the patient does not need medical care, the patient can stay home instead of needing to go to a crowded healthcare facility for an evaluation. The World Health Organization has recommended making the switch to telemedicine for remote diagnoses during the current COVID-19 outbreak, and the same technologies could be used in the future to prevent the spread of other diseases. Protecting Patient Privacy One of the reasons healthcare providers and policymakers were hesitant to embrace the growing popularity of telemedicine before it became an absolute necessity was the concern for patient privacy. Purpose-built telemedicine carts are designed with HIPAA compliance in mind. As long as medical professionals use them correctly, they should have nothing to worry about when it comes to protecting patients’ privacy. The Bottom Line Telemedicine isn’t just the buzzword of the day. It’s the wave of the future. The same features that make it practical during a wide-scale pandemic can also be applied to everyday situations that require a quick, remote diagnosis. Healthcare facilities need only find a reliable, reputable manufacturer of telemedicine carts to jump on board with this growing trend.
<urn:uuid:63d89038-c9f8-4439-8ec1-f6a39445ef7a>
CC-MAIN-2022-33
https://www.bodyprojex.com/when-every-second-counts-are-telemedicine-carts-the-answer-to-our-diagnostic-needs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00288.warc.gz
en
0.944995
725
2.78125
3
At least 57 Detroit public schools have tested positive so far for high levels of copper, lead or both in drinking water. The Detroit Public Schools Community District said Wednesday that it’s awaiting results for 17 more schools, which means the total number of schools with tainted water could go up. The school district said it initiated water testing last year to ensure the safety of students and employees. “This (testing) was not required by federal, state, or city law,” it said. “This testing, unlike the previous testing in 2016, evaluated all water sources from sinks to drinking fountains.” Recent testing found “higher than acceptable levels … (of) copper and/or lead” in at least one water source – such as a fountain or sink – at 16 of 24 schools, Vitti said in a statement released Wednesday. At the time, Superintendent Nikolai Vitti said recent testing found “higher than acceptable levels … (of) copper and/or lead” in at least one water source – such as a fountain or sink – at 16 of 24 schools. “Out of an abundance of caution and concern for the safety of our students and employees, I am turning off all drinking water in our schools until a deeper and broader analysis can be conducted to determine the long-term solutions for all schools,” Vitti’s statement reads. The Detroit Public Schools Community District, which has more than 100 schools, has not released details of the testing or said what may have caused the elevated levels of copper and lead. It has not said what may have caused the high levels of copper and lead. But the city’s water department has said the schools’ aging plumbing systems are to blame, adding that the issues don’t extend to the rest of the city. Lead and copper can enter drinking water when plumbing pipes that contain the metals corrode. Consumption of the metals can lead to a range of health problems, and the Environmental Protection Agency mandates fixes to water systems when lead and copper concentrations exceed certain levels. Lead consumption can be particularly harmful to children, leading to health effects such as impaired cognition, behavioral disorders, hearing problems and delayed puberty. The Detroit schools’ move comes in the wake of a lengthy water crisis involving dangerous lead levels in Flint, about an hour’s drive to the northwest.
<urn:uuid:64ef8bf1-56fe-4319-83b2-aa3830efe1a6>
CC-MAIN-2022-33
https://www.cnn.com/2018/09/20/health/detroit-schools-water-lead-copper/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00288.warc.gz
en
0.952588
497
2.890625
3
The basic principle foundation of Bhuddhist thought are known as the “Four Noble truths” which was the first revelation received by Bhuddha Sakyamuni. The Four Noble Truths are; 1.The Nature of Suffering (Dukkha). Suffering is real, all Sentient beings suffer in one way or another. 2.Suffering’s Origin (Samudaya). If Suffering exists, then it must have a cause – that cause is craving, attachment and ignorance 3.Suffering’s Cessation (Nirodha). If there is a beginning to suffering, it must also have an end (called Nirodha – the extinguishing) 4.The way to end Suffering (Maka). The way to end Suffering is the Eightfold Path as explained by the Lord Bhuddha. These 4 Truths can be likened to the following; - Diagnosis of an illness - Prognosis for the illness - Recovery thereof - Medicine to cure the disease - Suffering is universal (Dhukka) - The origin of suffering is attachment (Samutaya) - The cessation of suffering is attainable (Nirodha) - The Path to the cessation of suffering is detachment (Magkha )
<urn:uuid:39109820-e9d0-4e16-802c-d1b417e5d0a2>
CC-MAIN-2022-33
https://www.dharmathai.com/dhamma-blog/noble-truths/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00288.warc.gz
en
0.925622
278
3.25
3
London Plane Tree The London planetree is a hybrid between Plantus orientalis (Asian Planetree) and Plantus occidentalis (American Sycamore). This cross may have occurred as early as 1640 and from that point, the tree was extensively planted in London. This tree has now become popular worldwide, and may be one of the most commonly planted shade tree. The London planetree is often hard to distinguish from the American sycamore, though its most distinguishing feature is that its fruits appear in pairs. Like the American sycamore, this tree has exfoliating bark that reveals the creamy white inner bark. This tree attracts insect pollinators, birds, and small mammals. Family: Platanaceae (Planetree/ Sycamore) Characteristics: The 6-7 inch long leaves are, broadly toothed, dark green, and have 3-5 lobes. In the fall, leaves turn yellow-brown. In April, small flowers appear in rounded clusters. Male flowers are yellow, female flowers are red. The female flowers give way to spherical fruits which are brown, fuzzy, and appear in pairs. Each fruit holds numerous seeds. Bark is olive colored and exfoliates, revealing the creamy white inner bark. When young, this tree has a tight pyramidal shape and becomes rounded with age. This tree has wide spreading branches. It grows 70-100 feet high and 65-80 feet wide. Foliage: Deciduous (leaves lost seasonally) Geographic Origin: Europe (non-native) Cultivation Notes: Requires high maintenance. Does best in full sun, though can tolerate light shade. Prefers medium to wet and well-drained soils, though is very tolerant of all soil types. This tree is also generally tolerant of air pollution. Number on Campus: 48 Sources: Dirr, Morton Arboretum, Missouri Botanical Garden
<urn:uuid:daaa1d0a-9acc-4c09-9824-3fbed546cd99>
CC-MAIN-2022-33
https://www.fandm.edu/arboretum/complete-tree-species-listing/london-plane-tree-plantus-x-acerifolia
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00288.warc.gz
en
0.942121
395
3.140625
3
Morton’s neuroma is a painful foot condition caused by an irritation or damage to one of the nerves in your foot. A Morton’s neuroma involves one of the nerves leading to your toes as a result of a thickening of the tissue surrounding the nerve, this is most often between your third and fourth toes. Symptoms of a Morton’s neuroma Sharp, tingling or burning pain can develop in the ball of the foot. It is also possible for your toes to feel numb, sting or burn. Morton’s neuroma is not something which can’t be outwardly seen (such as a lump) but it is likely you will experience one of the following symptoms: - A feeling like you are standing on a pebble - Numbness or a tingling in your toes - A burning pain in the ball of your foot It is often to identify the presence of a Morton’s neuroma with a physical assessment of the foot as part of a biomechanical assessment. A Podiatrist is able to perform a test whereby pressure is applied to either side of the ball of the foot, when pain is felt it is likely a Morton’s neuroma may exist. An ultrasound scan of your foot provides the most accurate diagnosis, where this is necessary our Podiatrist will write to your GP to recommend this investigation. Morton’s neuroma occurs in response to irritation, injury or pressure to one of the nerves leading to the toes. There are several risk factors which increase the likelihood of irritation to the nerves in your feet which include: - Wearing tight, narrow fitting shoes can squash your toes together causing the nerves between your toes to become irritated. High heeled shoes in particular increase pressure on the ball of the foot and should be avoided if experiencing ball of the foot pain. - Sports which require tight fitting footwear such as climbing or skiing can lead to the development of Morton’s nueroma. Sports which involve a repetitive high impact on the feet such as running can also increase the likelihood of Morton’s neuroma. - A bunion is a type of foot deformity where the big toe deviates across causing the ball of the foot to become wider. When this happens it is more likely that footwear will apply pressure to the ball of the foot and in so doing irritate the nerves. Flat feet, high arches and hammer toes all increase the chances of developing a Morton’s neuroma. The treatment of Morton’s neuroma depends on many factors and assessment by a Podiatrist is a good place to start in deciding what is best for you. In many cases a change in footwear and resting from any repetitive activities such as running or walking can allow the pain to settle. Orthotics with a built in raise (metatarsal dome) just behind the toe joints can also be very effective in treating Morton’s neuroma. An orthotic can also be used to decrease the pressure on the ball of the foot and therefore relieve pain. In some cases either a cortisone injection to reduce inflammation or removal of the nerve via surgery are the most appropriate forms of treatment particularly when the other treatments have been unsuccessful.
<urn:uuid:924054b2-3a3f-494a-8662-e261c13244ab>
CC-MAIN-2022-33
https://www.jameshoggpodiatry.co.uk/mortons-neuroma/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00288.warc.gz
en
0.949905
679
2.796875
3
Mikhail Sergeevich Gorbachev was born in the village of Privolnoye near Stavropol, Russia. From the age of 13, he worked on a collective farm, where his father was a mechanic. He was an exceptional student and earned a law degree at Moscow University, where he joined the Communist Party and became Secretary of the law department’s Young Communist League. After returning to the Stavropol area, he rose in the League hierarchy to become Regional Secretary of the League, and in 1961 first became a delegate to the Party Congress. He spent the 1960s working his way up through the territorial bodies of the Party and continuing his education in agronomy and economics. As an agricultural administrator and party leader in his native region, he acquired a reputation for innovation and incorruptible honesty, and he soon rose in the Party hierarchy. He was first elected to the Supreme Soviet in 1970, and served on commissions dealing with conservation, youth policy, and foreign affairs. In 1971, he was elected to the Central Committee. In 1978, he became First Secretary of the Stavropol territorial committee, and by 1980 was a full member of the Politburo. The death of the long-time General Secretary of the Communist Party, Leonid Brezhnev, presented a brief opportunity for change in the Soviet Union. Brezhnev’s successor, Yuri Andropov, appeared to be grooming Gorbachev as his own successor, but after Andropov’s unexpected death, Gorbachev was passed over for the top spot and the aged Konstantin Chernenko came to power. When Chernenko too died barely a year after taking power, it was at last clear to the Party hierarchy that younger leadership was needed, and Gorbachev became General Secretary. He was ready to make long overdue reforms in the Soviet system. For six years, Gorbachev carried off a delicate balancing act, forcing reforms on a recalcitrant old guard, while trying to contain the demand for change from radical reformers within and without the Communist Party. He permitted an unprecedented freedom of expression in the USSR and ended the disastrous Soviet military involvement in Afghanistan. By 1989, the demand for reform had spread to the Soviet satellite states of Central Europe. Gorbachev notified the Communist leaders of those countries that he would not intervene militarily to keep them in power as his predecessors had done. Without the support of the Red Army, these dictatorships were quickly forced to yield to their democratic opposition, and Gorbachev began the withdrawal of the remaining Soviet forces from Central Europe. In 1990, he was awarded the Nobel Peace Prize for his foreign policy initiatives. Gorbachev continued to press for democratization in the Soviet Union and permitted free elections in Russia and the other republics of the Soviet Union. He survived an attempted coup by Communist hardliners in 1991 but relinquished office after the elected presidents of the constituent republics undertook to replace the old Soviet Union with a Confederation of Independent States. Since leaving office, he has continued to advocate the development of private ownership in a market economy, and the nonviolent resolution of conflicts in a democratic society. In 1992 he inaugurated the International Foundation for Socio-Economic and Political Studies, known as the Gorbachev Foundation. Gorbachev has served as president of the organization since its founding. The following year, he inaugurated a new environmental organization, Green Cross International. His wife, Raisa Gorbachev, died of leukemia in 1999. Her presence in her husband’s life was unprecedented in the Soviet experience. She appeared with him in public at home and abroad, served as his eyes and ears on her travels, and was one of his closest advisors. Mrs. Gorbachev’s activities were readily accepted in the West, but they were the subject of much criticism in the Soviet Union. They overcame a rigidly patriarchal code of Russian behavior in which women were rarely seen and almost never heard. Mikhail Gorbachev wrote in his memoirs, “We were bound first by our marriage, but also our common views of life. We both preached the principle of equality.” It was a long journey from her humble origins. Raisa Gorbachev was the daughter of a Ukrainian railway engineer. Mikhail Gorbachev met her while they were both students at the elite Moscow State University and they married in September 1953. Raisa gave birth to their only child, daughter Irina, in 1957. They have two granddaughters, Ksenia and Anastasia, and one great-granddaughter, Aleksandra. In the 1990s, Gorbachev was a vocal critic of Russian President Boris Yeltsin’s privatization policies, and of Yeltsin’s efforts to expand the powers of the presidency. Gorbachev himself mounted an unsuccessful campaign for president of Russia in 1996. He founded a new political movement, the Social Democratic Party of Russia, in 2001, but it won few adherents. Gorbachev stepped down as head of the Party in 2004 and it was later decertified by the national government. Gorbachev formed a new faction, the Union of Social Democrats, in 2007, but within a year he set this aside and joined billionaire financier Alexander Lebedev in founding the Independent Democratic Party. Gorbachev owns a part interest in the newspaper Novaya Gazeta, which generally opposes the ruling party of President Vladimir Putin and Prime Minister Dmitri Medvedev, but he has expressed support for some of Medvedev’s foreign policy positions, including military action in South Ossetia. Gorbachev has opposed American foreign policy in a number of areas, such as intervention in the former Yugoslavia, as well as the 2003 invasion of Iraq. He has also been critical of U.S. economic policy and the role of the International Monetary Fund. In 2009, Gorbachev joined his former adversary Lech Walesa and German Chancellor Angela Merkel in a public observance of the 20th anniversary of the fall of the Berlin Wall. Although he has not played a major role in post-Soviet Russian politics, Mikhail Gorbachev’s role in the historic transformation of the former Soviet Union has won him recognition around the world as one of the most influential statesmen of the 20th century. “What would you call it when the country is being ruled by old men who keep dropping dead, and the country is left without normal leadership?” In only three years, the Soviet Union lost three leaders: Brezhnev, Andropov and Chernenko. One after another, the men chosen as General Secretary of the Communist Party of the USSR fell dead, and one of the world’s two super powers looked lost and rudderless, mired in a hopeless war in Afghanistan, locked in a ruinous arms race with the United States, occupying half of Europe but unable to supply the basic needs of its own people. A new leader, the youngest man to lead the Soviet Union since the 1920s, promised change. The stated principles of Mikhail Gorbachev’s administration were “glasnost” and “perestroika,” or openness and restructuring, words which became known throughout the world. Gorbachev allowed a freedom of expression Russia and many other states of the Soviet Union had not known in their long history. The rise of democracy in Russia and the end of the Cold War division of Europe are the direct result of Mikhail Gorbachev’s extraordinary term of office as leader of the Soviet Union. When you initiated your reform policies — glasnost and perestroika — did you anticipate where this would lead? Did you realize how dangerous it might be? Mikhail Gorbachev: Yes, yes, yes. From the very beginning. I had before me the experience of Khrushchev, Kosygin, and many other people who were punished for their initiative. They were seen as people who were unreliable, who undermined the system. They were disposed of. You also have to understand that I was very familiar with what our country was really like, that you could expect anything at all from it. Furthermore, when I began to translate political reforms from statutes and slogans into a real process of political reform such as free elections, a parliamentary system, independent courts and so on — the separation of executive and legislative power — these were enormous changes. It was then that we began to set term limits — stipulated by law — for holding an official post, so ambitious people wouldn’t usurp their positions for decades. A student in Japan once asked me, “President, democracy is all very well. You were elected; you introduced free elections and everything, but at the next election you might not be elected and you will lose.” I told her, “But you see, even then I will not lose, because there will have been free elections and that is the result of what I have been trying to achieve.” I said, “If I win a free election then I will have a double victory. If I lose then there will only be one victory, but democracy will exist and that is the main thing.” For this reason, when they ask me nowadays how I feel, after all that has happened, I say, “Of course it did turn out that the very moment we were supposed to go further in reforming the Soviet Union, the Party and the economy, perestroika was interrupted, but what it accomplished, and what processes and tendencies it laid down — that is an enormous victory.” What do you think made you, of all the Soviet leaders, open to change, open to reform, both within the country and in the Soviet Union’s relations with the world? Mikhail Gorbachev: Well, after all, I did come from a different generation. We, our generation, were not associated with the repression. Moreover, we ourselves were aware of the repression, and that left its mark on us, because ours was an educated generation, a generation that knew its own value, and was capable of thinking and analyzing. When we found ourselves active participants in life, in work, and in politics, then we began to see a great deal and see it clearly. Little by little there came the awareness that in this country, this society, this system, no matter how hard we tried, no matter how sincere our convictions were, very little good could be achieved. Therefore the system had to be changed. But this happened when we were adults. Now if you are talking about me in particular, I think that my political career was successful. After the university, in 1955, I became a professional politician, and in just 15 years I was already a member of the Central Committee and the head of a large region, the equivalent of a governor. I governed this large region for almost nine years. And, evidently I distinguished myself in some way so that they invited me to come to work for Brezhnev in the Politburo, the Central Committee. So I found myself at that place at the time when society was growing ripe for — or really, had already given rise to — the desire and the expectation for change. Especially since this occurred during a three-year period when we lost three General Secretaries, Brezhnev, Andropov, and Chernenko. The whole country was simply in some kind of — what would you call it when the country is being ruled by old men who keep dropping dead, and the country is left without normal leadership? This was the mood in society. Plus the experience that I already had. After all, I had worked for seven years in the Politburo before I got to be General Secretary. Without that it would be unlikely that I would have gotten to be the head of a country like ours. It was, aside from everything else, a lucky combination of circumstances. Surely there were other leaders and other interests that would not have had the same results in the Soviet Union. What was there about your upbringing, your background, your experience that led you to be the man? Mikhail Gorbachev: I don’t know, but if you mean were there other candidates, then there certainly were. Whether they were better or worse, I do not know. But my chances turned out to be better. I was relatively young, the youngest of the lot, actually, and I was a man with a modern education who already had a great deal of experience working independently. At the beginning, that was important, that was significant. Also, the fact that… I was given the post of General Secretary, tantamount to being a Tsar, and did not get drunk on my own power, but instead began to transform it. That already was the result of my democratic convictions. I had had them ever since I was young, and they became my defining characteristic, my credo: devotion to democracy, respect for the worth of the individual. But the system had suppressed all that; it did not allow an individual the freedom to actualize himself. I did not accept this. Evidently, my reactions were the reactions of a member of the milieu to which I belonged and which I considered my own, that of the democratic, progressive, thinking intelligentsia, with a critical attitude toward all that. This was the source of it. May we ask you to remember what it was like growing up in a Russian village, in the countryside in the 1930s? Mikhail Gorbachev: What I remember is a pre-war village, and the life of the peasants, since I myself come from peasant stock. It was a very poor village, the housing was very poor, and so were our clothes, and there was a great deal of work, and even more anxiety. So this was a very serious life experience for children. And then of course there was the war. We lived on the German-occupied territory. That too is part of my memory. The front passed through our village, and then was pulled back, and then moved forward again, and this was all happening right in front of our eyes, the eyes of the children. Thus, you see, I belong to the so-called “children of the war” generation. The war left a heavy mark on us, a painful mark. This is permanent, and this is what determined a lot of things in my life. Because of growing up in a peasant family, and my experience of life and the war — which I saw myself, all this blood and destruction, horrible destruction — all this had great significance. This was all when I was a child, and yet that whole period is as clear as if it happened yesterday. I have forgotten a great deal of what happened in my life, but all that hasn’t left me. At that time, I began to feel the desire for something more; I wanted to do something to make things better. This was unconscious; it was just something that was brewing inside of me, without my really being aware of it. So, when my father said, “If you want, why don’t you go and try to get an education. If not, you can go on working the land with me.” And I said, “I want to try.” I ended up at the university, and this was a completely different world, the start of a whole new life. The university was like a door opening up on the whole world. For a young man thirsting for knowledge — coming from the sticks, from the back of beyond, coming to the capital, to Moscow, to the university — it was cataclysmic. You worked your way through the ranks of the Young Communists League, the Komsomol. What led you in that direction? Mikhail Gorbachev: I guess that by nature I am one of those people whom nature has given what they call leadership qualities. This perhaps is too strong a word — leadership qualities. What I mean is that among my peers I was always the one who took charge. I liked being the boss, but the main thing was my friends trusted me, and that’s why I say that most likely such qualities were innate in me. I always wanted to do something, accomplish something, or take the initiative. In school they kept choosing me to be the leader. I joined the Komsomol (Communist Youth League) while the war was still going on. That was really where it all started. Yet of course… There were many such people with initiative in the Soviet Union, very many, and they wanted to find ways for self-actualization. There was the Party, there was Komsomol, and naturally, since the Party was actually the only party available, everyone joined it. There was only one Party, everyone joined the same party. Also, I must confess, I remember that at the time the Party’s slogans appealed to me, they made quite an impression on me. It was very seductive, very attractive, and I took it all on faith. A lot of time still had to pass before I began to understand what the purpose and nature of the Party slogans really were, and what real life was, and what the Party meant for the country. And that the Party, which I had joined, itself badly needed to be reformed and reoriented toward democracy. And through this, the country could begin to gain some freedom. That came later, but it all started with the desire to do something and show initiative. That was what led many good people to join the Komsomol and the Party. How did someone become critical, questioning, in the Soviet system you grew up in? Mikhail Gorbachev: That’s a whole research project, a dissertation. Confrontation with life, that is what causes a person to adopt a critical position. But for that to happen, you yourself have got to have a certain amount of resources and vision, confidence in democracy, devotion to freedom. If you simply bend in the wind and cave in under the pressure of circumstance, you will accept things as they are. And in that case you do not develop a position of protest and criticism, but you will simply become like many others before you. Even now in Russia we have the same problem. It isn’t so easy to give up the inheritance we received from Stalinism and Neo-Stalinism, when people were turned into cogs in the wheel, and those in power made all the decisions for them. My position was as follows: through democracy, through glasnost, compel people, rouse people to speak for themselves, analyze, and decide for themselves what is to be done. That was the main thing that drove me. Of course I also saw that the country was breaking down, that it was beginning to lag behind. It could not react appropriately to the challenges of the technological revolution; it was not flexible, because the people were permitted no initiative, no freedom. The entrepreneurs were not permitted this, nor was anyone else: teachers, physicians, engineers, scientists. Everything was under control; everything was in gridlock or stagnant. That’s what I saw. One can and must understand that one cannot do or know everything. Even God, who created us, doesn’t lead us through life by the hand, but wishes and hopes that we will think and act in life in accordance with His commandments and expectations, and to rouse people to take the initiative, to have faith in themselves, and the desire to live as their conscience dictates. That means to awaken great feelings, which cannot help but make life into something completely different. You will say, “But that’s Utopia! Could it really be that Gorbachev was filled with such Utopian ideas, when he undertook such realistic actions, the overhaul of the Soviet system?” To which I would give you a very short answer. Idealists make the world go ’round, since everything starts with ideas. Yes, ideas! Everything comes from them and everything begins there. Thank you very much, Mr. President.
<urn:uuid:60908d6a-622d-4300-9fec-b128986cd82b>
CC-MAIN-2022-33
https://achievement.org/achiever/mikhail-s-gorbachev/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.986477
4,160
2.546875
3
Through the use of simulation tools and theoretical analysis techniques, the Free Electron Laser process is investigated for a wiggler that is generated by an ultrafast laser system. The development and availability of such systems allows for novel FEL designs due to the high peak power of such lasers. Even though such high powers are possible, difficulties arise due to inhomogeneity in the laser pulse. This project looks at simulation results for a system with a realistic laser pulse profile and looks in to the pulse-shape effects on various system parameters. Models are presented for the expected behavior with important parameters noted, as well as highlighting possible difficulties that might occur experimentally. While head-on interaction has been proven experimentally for the short wavelength regime , we believe that using a co-propagating laser can provide benefits that have currently been untested. This experimental setup is outlined in Lawler, J et al , and we are currently simulating how the use of an ultrashort laser pulse as an electromagnetic wiggler will affect characteristics of the output radiation. Copyright © 2015 CC-BY-3.0 and by the respective authors.
<urn:uuid:a7bae299-48fa-4a74-9b2e-0d9aa251f729>
CC-MAIN-2022-33
https://iris.enea.it/handle/20.500.12079/5681
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.944854
230
2.59375
3
Dyslexia, also known as reading disorder, is characterized by trouble with reading despite normal intelligence.Different people are affected to varying degrees.Problems may include difficulties in spelling words, reading quickly, writing words, “sounding out” words in the head, pronouncing words when reading aloud and understanding what one reads.Often these difficulties are first noticed at school. When someone who previously could read loses their ability, it is known as alexia. The difficulties are involuntary and people with this disorder have a normal desire to learn. MORE [Wikipedia] I republish this post every couple of years. The reason: I once overheard a mom telling her son he couldn’t be a writer because he was dyslexic. Not true. I’ll admit that even in a relatively mild case like mine it does take considerable focus (exhausting sometimes) to get things right or as near to right as possible. Also one does have to deal with people who are scornful, but so what. If your child is doing what s/he wants to do s/he’ll deal with it. Some days I get caught between my inability to spell a word and the artistic desire to use just the right one. There’s a temptation to take the lazy way out, to substitute the easy word for the perfect one. My spelling is so bad that I got Ds and Fs on tests in elementary school. I was always the first one to get booted out of the spelling bee. Later in life, when my son got home from school, I would hand him a manuscript and pay him a quarter for every misspelling he found. Now I just text him. Generally I can’t come close enough to the right spelling … if I could the spell-check might work for me … so I just make like a crossword puzzle: “Son, Homer between a rock and hard place … ?” “Mom, Scylla and Charybdis.” “Son, it begins with an ‘a’ and is foolish.” Even though I’m a slow reader and a poor speller, it never occurred to me that I couldn’t write for a living, probably because I wasn’t diagnosed with dyslexia until I was almost fortyish. (Story for another day.) I had no name to give this puzzling situation. In retrospect, that might be a good thing. For years I thought my problem was my Brooklynese, my pronunciation. On and off over time I read books and listened to tapes on elocution, which did seem to help a bit. Then Laurel D. sent us this Funny or Die video, The Bensonhurst Spelling Bee. It’s a chuckle-and-a-half and has nothing to do with dyslexia, but in an odd way it sort-of validates my hypothesis. Pronunciation may not be the root of the challenge, but it probably does help to complicate things. If you’re reading in email, you’ll likely have to click through to this site to view the video. (If you’re also from Brooklyn, it’s a must see.) Humor aside, dyslexia shouldn’t stop anyone from being a writer. It’s not a reason to give up on writing or to encourage your children to do so. HERE is a list of twenty-five well-known writers who are or were dyslexic. The late Stephen Cannell was famously dyslexic. He was open about it in an effort to help and encourage others. The Learning Center section of his website provides some background and tips. - It is estimated that 15-17% of the population is dyslexic. - PBS PARENTS, Reading and Language, the Facts About Dyslexia - Dyslexia Research Institute - The British Dyslexia Association - Brain activity pattern signals ability to compensate for dyslexia © Jamie Dedes; Illustration is in the public domain.
<urn:uuid:ef96216b-cc8d-4725-86ce-de08d35f700c>
CC-MAIN-2022-33
https://jamiededes.com/2018/11/30/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.966803
866
2.6875
3
LET’S GET STARTED - 1 What is Bookkeeping? - 2 What’s the Difference between an Accountant and a Bookkeeper? - 3 Why Does Bookkeeping Matter? - 4 How to Handle Bookkeeping for Your Small Business - 4.1 Keep your Business and Personal Expenses Separate - 4.2 Chose an Accounting Method: Cash or Accrual - 4.3 Categorize Transactions Accordingly - 4.4 Store All of Your Expense Receipts in One Place - 4.5 Reconcile your Bank Account - 4.6 Close the Month and Run Financial Statements - 4.7 Organize your Tax Deductions - 4.8 Accounting Software for Bookkeeping: It is Really Necessary? - 5 Wrapping Up the Bookkeeping Basics It’s certainly not easy being a jack of all trades as a business owner or entrepreneur. When deciding to take on the risk of starting a company, you probably did not plan on spending most of your time learning bookkeeping basics, payroll administration, financial statement preparation, and scrambling to meet tax-filing deadlines. Spending too much time on these bookkeeping and accounting activities takes time away from tasks that are important to running and growing your business such as innovation, sales, customer service, and pursuing opportunities to expand. Nevertheless, being your own bookkeeper helps you stay on top of key financial information about your company such as cash flow, and that knowledge that can help you make crucial decisions. To achieve that goal and achieve financial insight, it is necessary to maintain your own books. Another plus of maintaining accurate books is that every transaction will be recorded and categorized for your CPA. That is important because if you can provide accurate information and supporting documents to your CPA on April 15, you may be able to claim additional deductions and possibly secure a larger tax return. Also, if you can maintain well-kept books, you can provide lenders or investors a complete view of your company’s financial status. Then, they will be able to make financial projections about your company’s ability to pay back a loan. What is Bookkeeping? Bookkeeping is the recording of a company’s financial transactions to describe where the money is being spent, where revenue is being generated, and which tax deductions can be claimed. That may sound straightforward, but it can be complex. Transactions include purchases, sales, receipts, and payments by an individual, an organization, or a corporation. A tool called a chart of accounts helps organize your finances into five major categories: assets, liabilities, equities, revenues, and expenses. The two major bookkeeping systems are single-entry and double-entry. Double-entry is more complex, but also more heavy-duty. Transactions are entered into a journal or ledger, and each item is entered twice, both as a debit and credit. Bookkeeping transactions can be documented by hand in a journal or the data can be entered into a spreadsheet program such as Microsoft Excel or a specialized bookkeeping accounting software program. What’s the Difference between an Accountant and a Bookkeeper? The bookkeeper’s role may seem similar or identical to an accountant’s responsibilities, but they are quite different. A bookkeeper enters all the company’s financial transactions into a ledger or software. The bookkeeping process includes several steps from writing original journal entries that credit and debit the appropriate accounts to posting entries to ledger accounts and adjusting entries at the end of each accounting period. In contrast, an accountant reviews, interprets, analyzes, and reports financial information for the business. At year-end, the accountant also prepares financial statements and the proper accounts for the firm. Over the reporting period, the accountant’s responsibilities are called the accounting process, a series of activities beginning with a transaction and concluding with the closing of the books. The year-end reports completed by the accountant must also adhere to standards established by the Financial Accounting Standards Board (FASB); these rules are called Generally Accepted Accounting Principles (GAAP). Why Does Bookkeeping Matter? Driving a car without knowing a city and/or not having a GPS will make it extremely difficult to reach your destination. The same principle applies to a business. Without robust and accurate bookkeeping, you just do not know how your business is doing and whether you are earning a profit. Tax time will also be difficult without a clear picture of the company’s results and a lack of proper documentation. It’s Required During Tax Time To prepare your taxes, you will have to show your bookkeeping records to an accountant or tax preparer. The records include journal entries, a profit and loss statement, and a balance sheet. Other documents should include last year’s business tax return, payroll documents, bank and credit statements, and depreciation schedules. You can print these items out or send the digital files. Additionally, to make a thorough accounting of all income and expenses associated with your enterprise, it will help if you’ve saved as many documents as possible including gross receipts, checking and savings account interest, sales records, employee wages, insurance premiums, and office rent. You’ll Want to Know Where Your Money is Going Just as you need to take care of your personal health, there are steps you must take to ensure your company’s financial health. To properly chart your company’s finances, you must maintain financial statements, reports that summarize important financial accounting information. There are three main types of financial statements: the balance sheet, the income statement, and the cash flow statement. Tracking expenses is an important part of creating a budget for your business and maintaining your financial statements. Keeping a daily record of your expenses by logging receipts, invoices and other outgoing expenses improves the financial health of your budget. In turn, a budget helps you monitor where your money is going, makes it easier to target problem areas, helps you pivot when necessary, and helps you reach your financial goals. The better you understand the elements of your budget, the better you can stay on top of your financial health. Stated plainly, you must have solid financial information to prepare a meaningful budget. Bookkeeping is Needed to Borrow Money and Obtain Financing Cash is necessary to grow your business, but you first need to secure top-notch financing to obtain capital to grow your business or convince a venture capitalist to make an investment in your firm. But before banks or investors are willing to dole out a business loan, line of credit, or other funding, they want to ascertain that your company is safe and reliable. For due diligence, they will examine your assets and liabilities, credit score, cash flow history, financial projections, business plans, and more. How do you keep these critical financing factors in tip-top condition? With fundamental bookkeeping habits, of course. To qualify for business financing, it is imperative to have the proper financial documentation. And even if you do have your finances neatly organized in a silver three-ring binder, the numbers must prove to lenders that you and your business are a worthwhile risk and you can pay back the loan. A banker may even want to look at some of your bookkeeping procedures and documents to verify if you are operating your business in a sound, professional manner. Fortunately, bookkeeping not only helps document and organize your finances, but it arms you with the information necessary to improve your business’s health and qualify for financing. After all, capital is the lifeblood of a business. It Ensures Not Missing Out on Tax Deductions As we all know, there is nothing certain except death and taxes. But fortunately, there are many legal ways to reduce your corporate tax bill. One of the simplest ways to reduce your income tax bill is to ensure that you are claiming all tax deductions available to your business. A tax deduction (or “tax write-off”) is an expense that you can deduct from your taxable income. Essentially, tax write-offs allow you to pay a smaller tax bill. But the expense must fit the IRS criteria of a tax deduction. To claim these deductions, it is crucial to retain accurate records and keep up with your bookkeeping. A correctly maintained set of books will correctly categorize all the transactions for your CPA. The more information and support documents that you can present to your CPA at tax time, The greater ability they have to claim deductions. If he can achieve that, you should receive a larger tax return. The Importance of Catching Errors Long Before It’s Too late Though rare, banks, credit unions or other financial institutions make mistakes from time to time. Unfortunately, it is difficult to discover these errors and check all your financial transactions if you wait until tax time when you are inundated with paperwork. Quite simply, if you wait to reconcile your transactions until year-end, it will be harder to reconcile an overcharge with your bank. For that reason, it’s best to conduct various reconciliations at month and year-end to detect many errors and to correct them. There are other errors that can occur when recording financial transactions such as an error of omission. These errors occur when items such as an expense transaction are completely omitted from your company’s ledgers. Errors like these can be common but are difficult to detect. Therefore, it is necessary to enter these transactions on a timely basis before supporting documents such as a vendor’s invoice are lost. How to Handle Bookkeeping for Your Small Business Just as with any business, a small business has to establish a bookkeeping system, the day-to-day process of recording transactions, categorizing them, and reconciling bank statements. As a small business owner, you need to determine the best way to manage your books, accounts payable, and accounts receivable. There are a few bookkeeping options. First is the do-it-yourself (DIY) route to purchase software like QuickBooks or Wave. Alternatively, you could employ a simple Microsoft Excel spreadsheet. Another option is using an outsourced or part-time bookkeeper that is either local or cloud-based. Finally, when your business expands into a large enterprise, you may decide to hire an in-house bookkeeper and/or accountant. Keep your Business and Personal Expenses Separate When starting a business, it may be daunting to establish new checking accounts and a line of credit, but to properly track your business finances you must separate them from your personal finances. There are a few reasons why it is imperative. If you are operating a corporation or limited liability organization without a clear distinction between personal and business finances, there is a possibility that a court or creditor could hold you personally liable for debts incurred by your company. In addition, reconciling bank statements will be extremely challenging because it will be tough to find receipts for business expenses. Chose an Accounting Method: Cash or Accrual The first decision you must make when establishing a bookkeeping system is should you select cash accounting or the accrual accounting method. The cash system may be best for a one-person, home-based company or even a larger consulting firm with just one employee. If you operate your company on a cash basis, transactions are recorded when cash changes hands. In accounting, a cash account, or cash book, may refer to an account in which all cash transactions are recorded. The cash account includes both the cash receipts journal and the cash payment journal. In contrast, with accrual accounting, you must record transactions right away, even if the cash does not change hands for a period of time. Firms frequently establish their business with cash accounting and switch to accrual accounting as they grow. Categorize Transactions Accordingly Unlike a personal checkbook, record keeping for a business is much more meticulous because every transaction your company makes has to be categorized at the time it is recorded in your business books. This helps your bookkeeper or accountant notice possible deductions and will help you if your company gets audited. The categories you select depends on what type of business you operate and its industry. Overall, transactions can be placed into five account types: assets, liabilities, equity, revenue, and expenses. Individual line items are further broken down into subcategories that are called accounts. Store All of Your Expense Receipts in One Place At tax time, the onus is on you to provide proof of your business transactions so it is important to properly store supporting documents such as cash receipts and records is crucial. A good habit is making a small note on the receipt of its business purpose. You can jot the note down immediately or set aside time at regular intervals, i.e., the end of the day, week, or after a group of purchasing is completed (such as at the end of a business trip). Either way, it’s best if the purchases are fresh in your mind when you write the note so you can label the receipts correctly. Luckily, the IRS accepts digital records so receipts can be stored on cloud-based systems such as Dropbox, Evernote, or Google Drive. Another option is using an App like Shoeboxed, which is designed for receipt tracking. Reconcile your Bank Account The next important step is bank reconciliation. This task ensures that your books are up-to-date and accurate. Reconciling your bank statement entails comparing it to your bookkeeping records for the same period, and then identifying every discrepancy. Then, you make a record of those discrepancies so you or your accountant can ascertain if there is money missing from your business. This process is important for your company’s financial health. Accounting software can make the process easier because you can link your bank accounts to your software. The software then allows for daily or weekly reconciliation, and, in turn, it makes the month-end process much smoother. Close the Month and Run Financial Statements After your bank accounts are reconciled and adjustments were made in your recording tool, it is time to close the month and print financial reports. At month-end, you need to complete a report to keep your accounting statements updated. The month-end report adjusts your ledger for monthly transactions and financial records. This includes recording loan payments, reducing the value of business assets by their depreciation, writing off any bad debts, and recording entries for prepaid expenses. After the financials are prepared, the month-end adjusting and closing entries are recorded (journalized) and posted to the appropriate accounts. After those entries are made, a post-closing trial balance is run. The post-closing trial balance verifies the debits equal the credits and that all beginning balances for permanent accounts are in place. If your accounts do not balance, the month-end report is a time to correct any accounting errors. The month-end report is also used to review the past month’s transactions and make sure everything has been properly recorded. Organize your Tax Deductions Accounting for tax purposes one of the most important reasons for accurate bookkeeping. Whether your business is a sole proprietorship, partnership, or corporation, you must file an income tax return and pay income taxes. Most entrepreneurs understand that deductible expenses help to offset many of the costs of running a business. But not every expenditure is fully tax-deductible. Understanding which expenses can effectively reduce your taxable income will not only help you estimate your tax obligation for the coming year, it will also improve your business planning. Eligible expenses also tend to change from time to time, as IRS tax regulations evolve. The IRS has compiled a comprehensive guide of business deductions. With good records, preparing an accurate tax return will be easier and you are more likely to complete it on time. Poor records may result in underpaying or overpaying your taxes and cause you to file your returns late (and also paying penalties). If your accountant prepares your income tax return, poor records will almost certainly result in your paying higher accounting fees. If your business is a partnership, not only will you have to prepare a partnership tax return, but partnership return amounts will pass directly to the tax return of each partner. In this type of business, recordkeeping will directly affect the tax return of each partner. Accounting Software for Bookkeeping: It is Really Necessary? Small business bookkeeping transactions can be entered by hand in a journal or keyed into a spreadsheet program like Microsoft Excel. The majority of companies now use specialized bookkeeping software programs to record financial transactions. Accounting software can vary widely in scope, with some programs designed for simple, small business bookkeeping and some developed to manage the finances of large corporations. The benefits of accounting software benefits include increased accuracy by reducing or eliminating human errors in calculation. Manual bookkeeping processes involve making a lot of mathematical calculations by hand. An incorrect calculation early in the process could have a great impact on the end balance. Most accounting software can help you generate several important reports including a chart of accounts, an income statement report, a balance sheet, a cash flow statement, and several others. Wrapping Up the Bookkeeping Basics Most likely, you’d rather spend your time selling your product or service and expanding your business. As a result, you may find it’s difficult to devote enough time to take care of all your company’s complicated bookkeeping duties. When you reach this juncture, it may be the right time to hire a professional. At Punch Financial we can provide you with a modern accounting experience. Instead of hiring an in-house CFO and accounting team at great expense, you can outsource your bookkeeping to an experienced team with proven results for a fraction of the cost. We are a U.S.-based team of accountants, bookkeepers, and CFOs, who specialize in QuickBooks Online and partnering with high-growth companies. At Punch, we manage your day-to-day accounting and are an extension of your team. Each account is assigned a staff accountant, a Director, and a CFO. Our mission is to help you streamline your back-office and to provide you with actionable data to make you a more-prepared business owner. Please click here to learn more about Punch Financial.
<urn:uuid:f33a9838-fb2d-4ed0-8f5c-dad2ab54d672>
CC-MAIN-2022-33
https://punchfinancial.com/bookkeeping-basics/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.943988
3,788
2.640625
3
The Effects of Distance From the U.V. Light Source on Color Changing Beads! As you have learned, U.V. Beads change colors when exposed to U.V. radiation be it from the sun or a U.V. lamp ( Black Light!). Purpose: To see what effects the distance from the U.V. light source has on the color changing of the beads. Materials needed: U.V. Lamp, Strand of 5 Beads , ruler Procedure: work in groups of 3-4 ( each student will still answer the questions and fill out pertinent information on this page) 1. Obtain a strand of beads and a ruler 2. Move one bead so that it is at the end of the pipe cleaner strand, and then space the remaining beads out – 3-5 cm apart. Record the distances on the data table 3. Place the bead strand on the table under a U.V. light as directed by your teacher. 4. When directed to, turn on the light. Your teacher will say when to turn off the light. 5. When directed to, remove the bead strand from the light source and make and record observations about the color changes on your data table. ( observations such as darkness / intensity of color, uniformity of color-(( note that the “down” side of the bead may have not changed color like the “up” side)) ) Bead: Distance from end (cm) Observations/ color change/ intensity etc. 1 2 3 4 5 Control n.a. bead Questions/ analysis ( complete well written sentences) 1. What was the Independent Variable in this experiment? 2. What is the Dependent Variable? 3. What purpose did the control have? 4. Describe the results of the experiment. Bonus: Graph your data 5. What do you think would have happened if the light was left on for 3 or 4 times as long as it was? 6. What do you think would have happened if a piece of Kleenex tissue was placed over the beads? 7. What do you think would happen if a piece of plastic was placed over the beads? 8. What is the effect of UV radiation on people? 9. What do people do to protect ourselves from U.V. radiation? 10. What other variables could have been used in a lab like this one?
<urn:uuid:6deb84fa-f00f-4252-ae85-12b712b960f4>
CC-MAIN-2022-33
https://studylib.net/doc/6762801/uv-bead-lab-with-graph
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.946274
485
3.359375
3
UNIT 9. HELLO, SUMMER HOLIDAYS! Цілі: перевірити рівень умінь учнів з усного мовлення. Choose any of the following topics and speak of it. 1. On the move 1) Do you like to travel? 2) Which types of travel have you tried? (plane, boat, hitch-hiking.) 3) Which do you like best? Why? 4) When do you prefer to travel? 5) Have you traveled by car? Where to? 6) Have you ever travelled by plane? 7) When did you travel by plane last? 8) Where did you fly? 9) How long did it take you to get to the airport? 10) What opportunities does travelling give us? 11) What ways of travel do you know? 12) Which of them do you prefer? Why? 13) Why are many people fond of travelling? 14) What are advantages and disadvantages of travelling by train? (by air, by ship, by car) 2. Around the world 1) Where do you come from? 2) Where is it? 3) Where is it exactly? 4) What does your city like? 5) What is the official language of your country? 6) What information can we find in leaflets? 7) How can it help us? 8) What else can help us when we travel around the city? 9) What means of transport are comfortable for getting around the city? 10) Who can help us to go sightseeing? 11) Do you enjoy looking round cities? 12) What kind of places do you enjoy visiting? 13) What is the most interesting city that you have visited? Why? 14) Which cities would you most like to visit? Why? 3. Welcome to Ukraine! 1) Where is Ukraine situated? 2) What is the capital of Ukraine? 3) What are the biggest cities? 4) What interesting places in Ukraine do you know? 5) Which words do you usually associate with Ukraine? 6) What are the most attractive places in your country? 7) Are there many famous sights in your country? What are they famous for? 8) What’s your favourite place in your country? Is it popular with many people? Why? 9) What is the best kind of transport to travel about Ukraine? 10) What is the best city in our country? Why? 11) What are the most interesting tourist sights for visitors in our city (monuments, museums, temples)? 12) What are the most popular vacation places for people in our country? Why? 4. Save your planet 1) How «green» are you? What have you done to be more friendly to the environment? 2) What are the common environment problems? 3) What are the main pollutants? 4) What is the traffic situation like in your town? 5) Is there a good public transport system? 6) What everyday objects can we recycle? 7) What causes air pollution and acid rain? 8) Which of the world’s seas are the most polluted? 9) What is happening to the world’s rainforests? 10) What destroys the ozone layer? 11) What is happening to the world’s climate? 12) What can people do to prevent the ecological disaster? 13) What is it necessary to do to make our city better to live in?
<urn:uuid:41841172-5831-465d-a067-c92e9c84420e>
CC-MAIN-2022-33
https://subject.com.ua/lesson/english/6klas/100.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.882499
870
2.890625
3
Life cycle assessment (LCA) is one of the tools increasingly being used to consider the environmental issues associated with the production, use, disposal, and recycling of products, including the materials from which they are made. An LCA is generally recognised to consist of four phases: the establishment of the goals and scope of the assessment; the drawing up of an inventory of the input materials and energy, and the output emissions for each stage of the product life cycle; an assessment of the impact on the environment; and the identification of actions for improvement. The techniques of life cycle assessment are continually being assessed and developed. The results are often sensitive to the exact assumptions made. Environmental priorities and issues change in different societies, and therefore the analysis is specific in both location and time. There is a danger in reducing complex issues to simplistic and partial analysis. LCA can be used to identify priorities for improvements in process operations and product design and development, working closely with customers. The present state of the art and the sensitivity of results to subjective assumptions demand extreme caution when using LCA to compare the impact of alternative materials on the environment. The steel industry is committed to the concept of sustainable development. This is illustrated by the worldsteel Sustainable Development Policy, which states that the highest standards of environmental care require that the principle of sustainable development is incorporated into all aspects of the management of our industry. It is therefore essential that LCA studies should be correctly placed in the broader context of sustainable development. To avoid the value of LCA being undermined, the steel industry has been very careful in its use – both in the undertaking of studies and in the publication and interpretation of data and results. A set of practical guidelines has been drawn up and the worldsteel Board of Directors recommends it to all those undertaking or using LCA for the purposes outlined above. - Maintain the highest standards in both the undertaking of LCA studies and their disclosure to both internal and external audiences. - Seek to place LCA within its broader context of sustainable development (see worldsteel Sustainable Development Policy), recognising that this requires that due weight must also be given to the impact on human health and safety, welfare, bio-diversity, the impact on individual eco-systems, the length of a product’s life and its recyclability, and the sustainable use of natural resources. - Support efforts to develop a consistent, rigorous and transparent methodology for LCA to enable society to make informed choices on the environmental impact of products and processes. - Support the collection and dissemination of data on the use and reuse of materials, and the environmental effects resulting from their production. - Publish data clearly in a form that allows the user to clearly identify the key assumptions made and the sensitivity to those assumptions. - Avoid the selective disclosure of results or the use of data out of its original context. - Avoid claims of superior impact on the environment where the differences between materials are likely to be within the margin of error of the key assumptions. - Support the development of standards for LCA, including the work of the International Organization for Standardization (ISO).
<urn:uuid:b9737235-7347-4ebf-99d6-f035b9e8168a>
CC-MAIN-2022-33
https://worldsteel.org/steel-topics/life-cycle-thinking/lci-policy-statement/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.930348
639
3.203125
3
Researchers in Turkey say they may have created the cure to drug addiction through the implementation of a device called a "sub surface chip implant." Addiction medicine expert Akın Bostanoğlu said that a maintenance treatment that combines medication with the subsurface chip gives patients the best chance of sustainable recovery. While there is widespread interest within the treatment community for the use of the medicines promoted by the Alcohol and Substance Addiction Research Treatment and Training Center (AMATEM), there is also growing concern about the addictive properties of the drugs. A woman who struggled with drug addiction four three years, identified as E.Ü., said, "I applied to AMATEM and they installed a chip under my skin. Now I am more than happy. I have normal life and I don't want to remember those [dark] days anymore." E.Ü. has now been using the chip treatment for one and a half years. Across the country, physicians and legislators are ramping up efforts to stem the escalating heroin and other drug addiction crises. Treatment methods, however, vary in efficiency, which complicates the efforts of people with drug addiction in finding a sustainable recovery. Bostanoğlu, professor and member of the Department of General Surgery at Ankara Numune Hospital, told Anadolu Agency about the recent advancements in opioid treatment delivery methods and the most effective combination of therapies for recovery. "We place the chip in the fatty tissue through a very short process. This method gradually releases the active substance of naltrexone throughout three months and keeps it at a specified level. Because it is a very small implant, we can easily do this operation in five minutes with local anesthesia. We are in the surgical department, and as long as the psychiatric doctors approve, we can apply the chip every three months" said Bostanoğlu, adding that the department has already implanted the chip in 100 patients. The UN Office on Drugs and Crime (UNODC) said there are now more than 29 million people suffering from drug abuse disorders worldwide, an increase from the 27 million reported last year. Please click to read our informative text prepared pursuant to the Law on the Protection of Personal Data No. 6698 and to get information about the cookies used on our website in accordance with the relevant legislation. 6698 sayılı Kişisel Verilerin Korunması Kanunu uyarınca hazırlanmış aydınlatma metnimizi okumak ve sitemizde ilgili mevzuata uygun olarak kullanılan çerezlerle ilgili bilgi almak için lütfen tıklayınız.
<urn:uuid:cb9534e0-5f1e-4bc6-8f27-c114edee3818>
CC-MAIN-2022-33
https://www.dailysabah.com/health/2017/03/07/chip-implants-help-patients-battling-drug-addiction
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.928505
569
2.59375
3
The National Association of Elementary School Principals (NASEP) released a report this week detailing 10 steps policymakers can take to build stronger pathways from pre-K through 3rd grade. The 10 steps: 1. Better integrate federal policy, regulation and funding to help local communities create coherent pre-K-3 systems. 2. Coordinate and streamline state and local governance. 3. Expand funding for pre-K through 3rd grade learning, with a focus on ensuring at-risk children have access to high-quality, full-day learning experiences across the continuum. 4. Direct funds to high-quality programs. 5. Leverage and integrate private funds with public resources. 6. Create an aligned continuum of research-based, age-appropriate standards for young children that focus on social, emotional, cognitive, language and physical development, as well as academic skills and creative learning. 7. Build an effective, well-compensated early learning workforce through high-quality teacher and administrator preparation programs, professional development and continuing education. Ensure educators are well versed in the full continuum of early childhood education. 8. Develop and administer age-appropriate assessments to guide teaching and learning and increase program effectiveness. 9. Develop state and local longitudinal data systems that include pre-K program and student information. 10. Research and evaluate models of early learning integration and alignment. In this tough economy, wise investments in early learning can help ensure the development of a new generation of successful learners, workers and citizens. A version of this news article first appeared in the Early Years blog.
<urn:uuid:c92a54b6-ee94-4828-b781-847c14adaa30>
CC-MAIN-2022-33
https://www.edweek.org/teaching-learning/naesp-suggests-10-steps-to-building-pre-k-to-3-pipeline/2011/07
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.928206
327
3.203125
3
Combating diet-related disease, reducing nutrition-related disparities and creating a more sustainable food system should be top priorities in the U.S., according to a new report released in honor of the 50th anniversary of the White House Conference on Food, Nutrition, and Health. The report—the culmination of a series of events honoring the 1969 conference—was authored by a group co-chaired by Walter Willett, professor of epidemiology and nutrition at Harvard T.H. Chan School of Public Health. The 1969 conference led to marked improvements in hunger and nutrition policy through federal action. Marking the 50-year anniversary of the conference “offered an opportunity to reflect on how far our country has come in reducing severe nutrient deficiencies and extreme hunger, largely through federal bipartisan leadership,” said Willett in a press release. “But it was also a reminder that we still face enormous diet-related health and sustainability challenges and that progress is not possible without comprehensive, multi-sectoral action.” The new report contains 60 policy recommendations in categories such as federal nutrition programs, the food environment, healthcare, and research. On fiftieth anniversary of landmark nutrition conference, experts look at past successes, future challenges (Harvard Chan School feature)
<urn:uuid:960c1fb0-791b-4f0b-ab92-a79f16e9a072>
CC-MAIN-2022-33
https://www.hsph.harvard.edu/news/hsph-in-the-news/report-urges-comprehensive-food-policy-reform/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.920891
261
2.65625
3
The Himalayas is obviously an adventurous and challenging place on Earth. But very few know that this is also a spiritual journey for many. We as a Himalayan guide have heard of many transformations in our long profession as a trekking guide. This journey will force you to question your day to day life, seek your true purpose of life. For many, the journey to the Himalayas has helped them look at their own life from a different perspective. Some say it is a process of deep reconciliation. It’s never too late to plan a trek to the Himalayas, a once in a lifetime experience. Come experience the natural beauty and travel across the mysterious land of Himalayas, Nepal. Next year would be a perfect time to visit Nepal Tourism board has introduced a campaign called “Visit Nepal 2020” in the year 2020. The program is introduced so as to attract more people from around the world in Nepal. Many of the places which were destroyed by the very Destructive Earthquake in 2015 has been reconstructed so that the government can attract more and more tourists in the upcoming year 2020. Interesting Himalayas Facts - Himalaya Mountains spread across six different countries like Bhutan, Tibet, India, Nepal, Pakistan, and Afghanistan. - Mount Everest at 29,029 ft (8,848 m) is not only the highest peak in the Himalayas but the highest peak on the entire planet. - The second highest peak is the K2 which has attained a height of 8,611 meters or 28,251 feet. The third spot is captured by the majestic Kanchenjunga which stands at 8,586 meters or 28,169 feet. - The Himalayas refers to a mountain range and not a single mountain. - 75% of Himalaya is in Nepal - The Himalayas are the third-largest deposit of ice and snow in the world, after Antarctica and the Arctic. - A total of 12000 cubic kilometers or 3000 cubic miles of freshwater is stored within the 15,000 glaciers that are found within the Himalayan range. - About 100 million years ago, India was not in Asia, it was an island away from Asia, it is believed that about 70 million years ago there was a large-scale conflict between India and Asia that resulted in world changes. The Great Himalayas was a composition that was due to the explosive collision of two landmasses. - Himalaya formed 70 million years ago But Still Youngest. Plan your Trek to the Himalayas I will advise not to plan for travel in Winters & Monsoon, Travel in before or after the monsoon is either in April – May (Spring) or October – November (Autumn) After November It will be very dangerous to trek. In April & May, The temperature is mildly warm at lower elevations and the moderate above 4000m. In the mountains, the temperature is warmer and might go up to 20+°C during the day. During the night time, the temperatures might range from 5-7°C In October & November It is very fewer chances of rain, & little warmer than April & May But if rains Temperature can get very low ( -5°C to -15°) at nights. Book a package It is advisable to book a package especially when you are on a solo trip. You Can Book with Us. Your safety is our priority. Things to Carry - Original I’d Card (Passport) Which is very needy get a permit. - Hard Cash – The last working ATM machines (with hefty fees) are in Namche Bazaar. That will be your last chance at getting money - Power Bank - Track pants - Dry-fit Clothes - Light Weight Windcheater - Monkey Cap - Hand Gloves - Rain Wear - Trekking Shoes - Minimum 1 Litre Water Bottle - Energy Powder - Torch or Head Torch (Carry Battery Separately) - First Aid Kit + Your Medicine (with perceptions) - Rucksack (65-70Litre) - Small Backpack - Trekking Pole Don’t miss these things in your Nepal Trip Kathmandu is the capital city and largest city of Nepal. Kathmandu is also the largest metropolis in the Himalayan hill region. Best Places to visit Nepal - Nagarkot Sunrise View and Day Hiking from Kathmandu - Pashupatinath Temple - Boudhanath Stupa - Kathmandu Durbar Square - Garden of Dreams Popular Treks in the Himalayan Region of Nepal Nepal is home to 75% of the Himalayas. So obviously, the list of the peaks and mountains is too long to mention it here. Although we’ve handpicked some of the popular destinations for trekking here, you may want to go through the list of Himalayan Peaks. If You’re adventurous and visited Nepal it is the best reason to trek Mt. Everest Base Camp Trek. It can take 14-16 days. “It is not the mountain you conquer, but yourself “– Sir Edmund Hillary. It is the highest place in the World (8848 Meters) Things To get in Mind – Less Oxygen, More Walk, Heavy Weight, Drink More Water. The Annapurna Circuit is a popular name for a trek within the Annapurna mountain range of western Nepal. It takes about 12–14 days for this trek. It’s the most diverse trek in the world. It contains the world’s deepest river gorge. Mountain biking is becoming very popular nowadays in Annapurna Circuit Region. Manaslu Circuit Trek is a stunning trek with spectacular views of Mount Manaslu. It is the 8th highest mountain in the world (8,163 meters). It is also known as Kutang. The Manaslu Circuit Trek is a type of Moderate and high Passes Trekking Path in Nepal. also Restricted area of Himalayan land luck. Manaslu Circuit Trek average duration is 14 days to 15-17 days just Round Manaslu Larke La Pass. Ghorepani Poon Hill Trek 8-10 days is one of the shortest and interesting treks among the spectacular treks in Nepal. Poon hill trek is open for independent trekkers as well. If you want to enjoy this trek on your own and wish to walk and explore nature alone, then you can do solo trekking as well. It is among the safest trails in the region where you will feel less difficult even if you go solo trekking. Langtang Gosaikunda Trek offers an ideal trek for those without much time but wishes to experience Nepal’s unique combination of cultures, landscapes, stunning mountains, and diverse wildlife and vegetation. It takes around 8-10 days to complete this trek. Langtang valley trekking is aptly called ‘the valley of glaciers” Here, mountain rise, soaring towards the sky. here are 108 lakes in this area, but the most popular are Gosaikunda (4460m), Saraswatikunda and Ganesh Kunda nearby each other. Come let’s plan an escape together for a spiritual experience in the Himalayas. Get ready for a transformation.
<urn:uuid:9e5fcef7-d219-4f45-a745-ccccae713107>
CC-MAIN-2022-33
https://www.nepalintrepidtreks.com/trek-in-himalayas/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00288.warc.gz
en
0.930764
1,560
2.9375
3
Some time ago I noticed that my fennel bush was crawling with caterpillars. They had distinctive green, yellow, and black stripes in a dot and dash formation somewhat like Morse code. Despite the fact that they were devouring my fennel fronds with glutonous ferocity, I found them quite pretty. When I took one down to Ward’s Nursery in Great Barrington and mentioned that I’d found it on the fennel, it was identified as the caterpillar of the Eastern Black Swallowtail butterfly which feeds off anything in the carrot family — parsley, dill, Queen Anne’s Lace, fennel, and anise. In fact, its western counterpart is called the Anise Swallowtail because — well — I think I’ve established its eating preferences. When I looked up Eastern Black Swallowtails in my Audubon Butterfly Guide, I discovered that they’re very common and smaller than most North American Swallowtails (the wingspan is only 3 inches across), but that doesn’t make them any less beautiful. Their wings are the black and blue of old stained glass windows with bright touches of yellow and orange dappling the outer edges. The female and male display subtle differences: the wings of the female have more blue, the males’ wings are spotted with two rows of yellow. Then, practically overnight, the caterpillars were gone from my garden, leaving my fennel plant stripped but still upright. The fronds began to grow back. But I missed watching the caterpillars feed. I missed this small but immediate reminder that nature is constantly performing an intricate balancing act. I’m not sure where they went to in the interim, but I recently noticed dozens of black wings in my sun garden, fluttering over the echinacea and competing with the hummingbirds for a turn at the monarda. There they were! The Eastern Black Swallowtail caterpillars had made the trip from vegetable bed to perennial border, transforming themselves into butterflies along the way. If you visit the new Butterfly House at Project Native in Housatonic, Mass. (http://projectnative.org), you’ll find out more about the critical symbiotic relationship between plants and butterflies. Here’s a poem about metamorphosis by the poet Stanley Kunitz who died at the age of 100 in 2006. He wrote this poem when he was in his late seventies:The Layers by Stanley Kunitz I have walked through many lives, some of them my own, and I am not who I was, though some principle of being abides, from which I struggle not to stray. When I look behind, as I am compelled to look before I can gather strength to proceed on my journey, I see the milestones dwindling toward the horizon and the slow fires trailing from the abandoned camp-sites, over which scavenger angels wheel on heavy wings. Oh, I have made myself a tribe out of my true affections, and my tribe is scattered! How shall the heart be reconciled to its feast of losses? In a rising wind the manic dust of my friends, those who fell along the way, bitterly stings my face. Yet I turn, I turn, exulting somewhat, with my will intact to go wherever I need to go, and every stone on the road precious to me. In my darkest night, when the moon was covered and I roamed through wreckage, a nimbus-clouded voice directed me: “Live in the layers, not on the litter.” Though I lack the art to decipher it, no doubt the next chapter in my book of transformations is already written. I am not done with my changes. You can find more poems by Stanley Kunitz at http://www.poets.org/poetsorg/poet/stanley-kunitz
<urn:uuid:e017493b-644e-49d3-ac9a-7ebd9f3377db>
CC-MAIN-2022-33
http://lizagyllenhaal.com/2014/08/fennel-fronds-and-black-swallowtails/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.964064
808
2.5625
3
Google email has a huge number of functions and is perfectly integrated with the services of the internet giant. However, for some devices it may be too “heavy”. In these cases we recommend use Gmail in basic htmla little further down we will explain how and why We should do it. Why use the basic HTML version of Gmail For those with a very slow internet connection, the basic HTML version of Gmail will load and run much faster than the standard version. Even with the basic version, we will be able to check our emails normally. We will also want to use this version when we have a limited data plan, here every MB counts; We even recommend preventing Android apps from using data in the background, to try to save as much as possible. Compared to the standard version of Gmail, the basic version loads fewer items and uses fewer resources; so we will end up consuming less data. Additionally, if we are not interested in functions such as tasks or calendars, we will not lose much with the most “Lite” version of Google’s mail service. However, be aware that if you overuse Gmail’s spell checker, keyboard shortcuts, and rich formatting, they won’t work with this version. How to use the basic version of HTML To be able to use the basic version of Gmail, it is not necessary to make changes in the configuration, we can switch between the standard and basic view as many times as we want. For this we are going to enter Gmail from the web browser and launch the site in basic HTML directly. After accessing this link, Gmail will ask us if we want to enter the basic version or use the modern one. Obviously, we are going to choose the basic one. We can find, read and write new emails, even perform other tasks as usual. How can we access quickly? All we would have to do is bookmark that URL address in our browser. When we want to enter the basic version, we use the bookmark. Instead, if we want to use the modern version, we simply log into Gmail as we normally would.
<urn:uuid:5f305a42-edcb-4164-bfe2-cbae2b644c9e>
CC-MAIN-2022-33
https://awdhesh.com/how-and-why-to-use-gmail-in-basic-html/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.928884
470
2.515625
3
Properties and Changes of Materials This unit teaches children about the wider properties of materials and their uses. They learn about mixtures and how they can be separated using sieving, filtration and evaporation. They study reversible and irreversible changes, and use common indicators to identify irreversible changes. ❇ MEMORABLE MOMENT Completing a range of investigations. ️✏️ WRITING OPPORTUNITIES To write up an investigation including; question, equipment, variables, prediction, method, results and conclusion. 🌳 LEARNING OUTSIDE THE CLASSROOM Children will take their investigation outside to see if there is an explosive irreversible reaction when cola and mentos are mixed. Unit Sequence: Learning Intentions Properties of materials. To revise different materials have different properties. Materials' properties makes them suitable for specific purposes. Testing properties. To compare and group everyday materials by their properties, including hardness, solubility, transparency, conductivity (electrical and thermal) and magnetism. Measuring change in temperature/ Testing thermal insulators. To take measurements, using a range of scientific equipment, with increasing accuracy and precision, taking repeat readings when appropriate. To gather and record data and results of increasing complexity, selecting from a range of methods (scientific diagrams, labels, classification keys, tables, graphs and models). Solubility. To know that some materials will dissolve in liquid to form a solution, and describe how to recover a substance from a solution. Exploring mixtures- sieving. To use knowledge of solids, liquids and gases to decide how mixtures might be separated, including through filtering, sieving and evaporating. Exploring mixtures- filtering. To separate mixtures by filtering, sieving and evaporating. Exploring mixtures- evaporating. To demonstrate that dissolving, mixing and changes of state are reversible changes. Reversible and irreversible changes. To identify, demonstrate and compare reversible and irreversible changes. Scientific Enquiry: Investigations Can you clean dirty water? Do all solids dissolve? Will it erupt? Which materials conduct heat? 🏁 BIG FINISH To complete a range of questions that demonstrate their understanding of the topic. 📖 FOCUS TEXT(S) Children will be reading a wide range of non-fiction texts in this unit.
<urn:uuid:f0356c60-2fa4-4c66-b718-416c7fdee39d>
CC-MAIN-2022-33
https://curriculum.parkfieldprimary.com/science/year-5/year-5-properties-and-changes-of-materials
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.862573
507
4.40625
4
Renal stones and endourology - Renal stones (kidney stones) affects up to 5 - 10% of Americans - It is most common in men in their 40's and 50's - Common presentation: - Flank pain - Blood in urine - Recurrent infections - Endourology is a minimally invasive technique available to treat kidney stones Possible causes of renal stones - Too much calcium in the urine - Metabolic disorder - Dietary influence - Inherited conditions Renal stones and endourology urologist Noah Canvasser, M.D. Help is available - Consult your physician. - Renal stones are a treatable condition. - For more information, call the UC Davis Urologic Surgery Clinic at (916) 734-2222 or (800) 770-6930.
<urn:uuid:29d1b58d-558a-44c2-8338-41f50f68347a>
CC-MAIN-2022-33
https://health.ucdavis.edu/urology/specialties/renal_stones/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.841022
187
2.59375
3
A Severed Arm and a Mother’s Fury An often-explored trope of both contemporary and classic literature is the utilization of somewhat morbid imagery to further a narrative or perhaps convey an underlying message in a vividly grotesque manner. One such example can be found within the English poem Beowulf during a scene where the eponymous character defeats the macabre monster Grendel by tearing his arm off in hand-to-hand combat: “…a tremendous wound appeared on [Grendel’s] shoulder. Sinews split and the bone-lappings burst. Beowulf was granted the glory of winning” (lines 815-820). What strikes me particularly profoundly is the specificity with which this inflicted wound is described. The references to tearing sinew and burst bone-lappings provide the reader with a harrowing image of brutality. Today we have a plethora of mediums delineating all manner of barbarism, from frenetic video games such as Grand Theft Auto that simply suit the palate of the sadist to serious narrative films such as Quest for Fire where violence is used heavily to advance the story. While we may have those and plenty of others, the people of Old England would have relied much more on the significance of violent imagery within written works like Beowulf. Emphasis of this aforementioned imagery can be found in the application of the adjective ‘tremendous.’ The Oxford English Dictionary details the word as follows: “hyperbolically, or as a mere intensive: Such as to excite wonder on account of its magnitude or violence; astounding; extraordinarily great; immense” (“Tremendous”). Given that this definition explicitly references violence and that the word ‘tremendous’ is being used to illustrate a scene of violence, it would be relatively reasonable to deduce that the usage of the word within Beowulf was a conscious effort on the part of the writer to create an instance of peculiar emphasis to grab the reader’s attention in a manner not dissimilar to the way Beowulf grabbed Grendel by the arm. Another occurrence of brutish symbolism in Beowulf might perhaps be found in the scene with “…the hand [Beowulf] displayed high up near the roof [of Hrothgar’s hall]: the whole of Grendel’s shoulder and arm, his awesome grasp” (lines 832-835). The arm is often seen as a source of strength, take for example the image of a muscular arm used on Arm & Hammer household products. The severing and subsequent display of Grendel’s arm can easily be interpreted as a severing of the strength of evil and the display of the prowess of good. A graduate thesis by Scott White of Utah State University suggests that severed limbs in narratives “represent lost humanity” (White vi). Being that Grendel is described as inhuman within Beowulf, the claim made by White holds relevance. Further bolstering this claim is the idea that Grendel’s arm on display might also abstractly represent a slow disappearance of humanity and slight presence of savagery in the character of Beowulf himself. While undoubtedly a noble warrior, Beowulf is still human and thus remains highly subject to certain human desires and feral inclinations. A dissection of Beowulf’s macabre elements would be incomplete without bring up Grendel’s mother. Contrary to the salaciously sensual portrayal by Angelina Jolie in the cinematic adaptation of Beowulf, the original text details Grendel’s mother the way a grindhouse flick would describe its arch-villain: “[Beowulf] observed that swamp-thing from hell / the tarn-hag in all her terrible strength” (Beowulf lines 1518-1519). Much like with Grendel, the poem is describing his mother with inhuman, and in this case, somewhat hellish characteristics. Perhaps this is done purposely in order to sharpen further the contrast between good and evil in the poem. What sticks out about this specific passage is the referring to of Grendel’s mother as a “swamp-thing from hell.” The common assumption of Hell is that it’s a place of fire and brimstone where the wicked, wrongdoers, and otherwise unrepentant souls are sent for an eternity of damnation. Not exactly the type of place you’d associate with a creature of the swamp. The writer here is likely attempting to articulate that Hell can exist beyond the standard assumption as a place of pain or the residence of a being that inflicts it. Similarly to Grendel, his mother meets a violent end, though she dies by a blade wielded by Beowulf as “a resolute blow…bit deep into her neck-bone / and severed it entirely, toppling the doomed house of her flesh” (Beowulf lines 1565-1566). Here we have another reference to severance as well as barbarity being implemented as a storytelling device to advance the plot. Another speculation worth considering and explicating is the idea that Grendel’s mother is being personified so voraciously as to violently illustrate the feelings of seething vengeance possessed by a mother experiencing the loss of her child. Take away the thing loved most by a mother and you’re left with this love being channeled into savage, wanton retribution. Going back to an earlier point raised about how severed hands can represent severed humanity in literary narratives, Grendel could be elucidated as the hand of his mother. His death represents severance from his mother, leaving his mother completely devoid of even a fathom of humanity and filled to the brim with nothing but vicious hellfire. Household products, infuriated mothers, and flying limbs aside, perhaps it would be best to tie reference to something with staunch relevance to the period in which Beowulf was written. The Bible states: “As surely as I live, declares the Sovereign Lord, I will reign over you with a mighty hand and an outstretched arm and with outpoured wrath.” (Holy Bible, Ezek. 20.33). How this relates back to Beowulf is fairly straightforward: Beowulf defeated Grendel with his hands and, later in the poem, became king in his homeland. In the context of this passage, the character of Beowulf could be seen as a parable of God by way of showing the strength of his hand to defeat Grendel while the poem has Grendel serving as a crude personification of evil especially given that the character of Grendel is a descendent of Cain. For those unfamiliar with the Biblical context, Cain was the son of Adam and Eve who killed his brother and was consequently banished by God to a life of roaming. Building off of this discussion of Biblical reference, Beowulf is believed to have been written between 700 and 1000 AD. This is fairly near the time that Anglo-Saxon England began converting from Paganism to Christianity. “The conversion of the Anglo-Saxons…began at the end of the 6th century and was completed [near] the second half of the 7th century” (“Conversion of the Anglo-Saxons to Christianity”). Given that Christianity was fresh and fervent in the minds of folk at the time, the Biblical elements sprinkled throughout Beowulf appear as more than mere coincidence. While today we have a constantly evolving variety of mediums and storytelling mechanics, the utilization of malformed imagery as a means of striking raw emotion into viewers and readers alike has remained a constant and formidable force throughout the ages. Shock value works far beyond the concept of brutal violence for the sake of more brutal violence. Whether it be the symbolism behind a severed arm or the twisted, gnarled appearance of something that is supposed to serve as a maternal figure, the elements of shock and horror that permeate Beowulf serve profoundly as a means of using bits and pieces of gruesome details to stick out to the reader and advance the progression of the narrative. “Beowulf.” The Norton Anthology of English Literature Ed. Stephen Greenblatt. 9th ed. Vol. 1. New York: W.W. Norton, 2012. 41-108. Print. “Conversion of the Anglo-Saxons to Christianity.” The History of England, The History of England, 2010, www.england-history.org/2012/10/conversion-of-the-anglo-saxons-to-christianity/. Holy Bible. New International Version. Zondervan, 2015. “Tremendous, adj.” OED Online. Oxford University Press, June 2017. Web. 17 September 2017. White, Scott, “Severed Hands as Symbols of Humanity in Legend and Popular Narratives.” 2014. All Graduate Theses and Dissertations. Paper 3556. Web. Shakespeare anticipates the Freudian concept of the dream as egoistic wish-fulfillment through the chaotic and mimetic desires of his characters in “A Midsummer Night’s Dream.” The play also utilizes a […] “Sex is something I just don’t understand. I swear to God I don’t,” (Salinger, 63). It might take Holden Caulfield nine chapters to admit to this, but his sexual confusion […] Both within ‘The Merchant’s Tale’ by Chaucer and ‘An Ideal Husband’ by Oscar Wilde, the theme of power is explored, with various characters attempting to increase their power often by […] The roles of women in Middle Eastern culture have varied throughout the decades, ranging from being delicate creatures in need of protection to becoming blind soldiers suddenly dedicated to a […] In Victor Lavalle’s Slapboxing with Jesus the neglected, maimed, and the damned people of New York are put in the spotlight. The people that are described are not thrown in […] According to critics Alistair Rolls and Jesper Gulddal, the genre of detective fiction is “located in a field of binaries: structure versus innovation, stability versus mobility, the one final solution […] Regarded as the most prominent writer from the South, William Faulkner spent his entire writing career building stories that both speak of human nature and of the nature of his […] Toni Morrison’s 1977 novel Song of Solomon is easily one of her best-selling novels and is often credited as contributing to her winning the 1993 Nobel Prize in Literature. However, […] Henry James’ popular novel The Turn of the Screw is often subjected to re-examination because the writing is saturated with ambiguity preventing the reader from deriving a definitive resolution. This […] An often-explored trope of both contemporary and classic literature is the utilization of somewhat morbid imagery to further a narrative or perhaps convey an underlying message in a vividly grotesque […]
<urn:uuid:2095519e-e0f7-40fd-9250-e6b9eefd5999>
CC-MAIN-2022-33
https://literatureessaysamples.com/a-severed-arm-and-a-mother-s-fury/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.95417
2,358
3
3
In today’s competitive sport environment, discovering effective methods of facilitating optimal athletic performance is paramount to success. The recovery period is essential in maintaining athletes’ physical and psychological well-being and crucial in the pursuit of intense physical training and satisfying performances Rest and recovery are critical components of any successful training program. They are also the least planned and underutilized ways to enhance performance. Most easily defined as a combination of sleep and time spent not training, rest is the easiest to understand and implement. How you sleep and spend this time is very critical. Recovery, however, refers to techniques and actions taken to maximize your body’s repair. These include hydration, nutrition, posture, heat, ice, stretching, self-myofascial release, stress management, Recovery is multifaceted and encompasses more than just muscle repair. Recovery involves chemical and hormonal balance, nervous system repair, mental state, and more. A proactive recovery means providing the body with all the nutrients it needs, in a speedy and practical manner, to optimize the desired processes following each session. Recovery encompasses a complex range of processes that include; • refuelling the muscle and liver glycogen (carbohydrate) stores • replacing the fluid and electrolytes lost in sweat • manufacturing new muscle protein, red blood cells and other cellular components as part of the repair and adaptation process • allowing the immune system to handle the damage and challenges caused by the exercise bout The emphasis an athlete needs to place on each of these broad goals will vary according to the demands of the exercise session Two recovery practices are foundational and must-not be missed: While there are many more accessory recovery techniques that can be used to complement nutrition and sleep, if you are not getting in the right nutrition and enough sleep, the accessory recovery techniques will have minimal advantage. You should focus your efforts on getting those two recovery habits perfected to get the most bang for your buck. For athletes training once per day or more often, refuelling for the next workout as quickly as possible is crucial. Refuelling accurately and consistently after workouts will restore muscle and liver glycogen stores, replace fluid and electrolytes lost in sweat, promote muscle repair and maintain optimum immune system functioning. Athletes who optimize post-exercise nutrition will perform better in their next training session and accumulate more high quality sessions than athletes skipping post-exercise recovery fuelling. 30 Minute Post-exercise Fluid, electrolytes, carbohydrates and protein are the foundation of proper recovery nutrition. It has been suggested that carbohydrate co-ingestion is needed to further augment the anabolic response to exercise. Muscle protein synthesis does not seem to be affected by the ingestion of carbohydrate only during post exercise recovery. Co ingestion of protein with CHO during recovery from endurance exercise increases mixed skeletal muscle FSR and induces a more positive whole body net protein balance compared with drinks matched for total CHO or total energy intake. To restore muscle glycogen and promote protein synthesis, consume 0.8g per kg of body weight of carbohydrate and 0.2g per kg of body weight of protein. For a 70kg or 154lb athlete this would be 56g of carbohydrate and 14g of protein. Fluid, electrolytes, carbohydrates, and protein can be replaced with a commercial recovery drink, a homemade smoothie or with real food plus water (real food first!). Two to Three Hours Post-exercise Continue your recovery nutrition two to three hours post-exercise by eating a whole foods meal. It is OK to eat earlier than this if you are hungry but do not delay this post-exercise meal more than three hours. This meal should contain a combination of carbohydrate, about 20g of protein and some fat. Dividing daily protein intake into four or more 20g meals has been shown to have a greater stimulus on protein synthesis. A 20g feeding of protein is the sweet spot to maximally stimulate muscle protein synthesis. Athletes should aim to consume 125-150% of their estimated fluid losses in the 4-6 hours after exercise. Fluid replacement alone will not guarantee re-hydration after exercise. Unless there is simultaneous replacement of electrolytes lost in sweat, especially sodium, consumption of a large volume of fluid may simply result in large urine losses. The addition of sodium, either in the drink or the food consumed with the fluid, will reduce urine losses or thereby enhance fluid balance in the post exercise period. Further, sodium will also preserve thirst, enhancing voluntary intake. Real food Vs supplements Many athletes fall into the trap of becoming reliant on sports food supplements, believing this to be the only and/or best way to meet their recovery goals. This often results in athletes “doubling up” with their recovery, Unless constrained by poor availability or lack of time, athletes are best advised to favour real food/fluid options that allow them to meet recovery and other dietary goals simultaneously. This is especially important for athletes on a low energy budget. Increasing Your Sleep Quality and Duration Sleep is the most important time to recover. Adequate levels of sleep help to provide mental health, hormonal balance, and muscular recovery. Everyone has individual needs based on their lifestyle, workouts, and genetic makeup. Foundation sleep recommendations for adult athletes are 8 to 10 hours per night Along with sleep duration, sleep quality and sleep phase also affect the regenerative qualities of sleep. Sleep quality can be improved by reducing disturbances by wearing earplugs and sleeping in a cool, dark room. Following a pre-sleep routine of relaxing activities, avoiding light exposure from screens in the hour before bed, avoiding stimulants such as caffeine after noon and alcohol in the evening may increase your sleep quality and duration. Restless leg syndrome can occur in athletes with low serum iron levels and disrupt normal sleep patterns. Eat well, sleep well and recover fast because your competitors probably are doing it!
<urn:uuid:594109a1-c146-43a9-938c-cb7f7a672c0d>
CC-MAIN-2022-33
https://michellegreaneypt.wordpress.com/2017/01/01/%E2%80%8Brecovery-practices-for-endurance-athletes/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.93872
1,221
2.84375
3
When you write a research paper, the success of your work can depend almost as heavily on the work of others as it does on your own efforts. Your information sources not only provide essential facts and insights that can enhance and clarify your original ideas, source material can help you better understand your own theories and opinions and help you to arrive at more authoritative, clearly drawn conclusions. Because of the debt that you, as the author of a research paper, owe to your sources, it is essential that you understand how to present, acknowledge, and document the sources that you have built into your work. You should be aware that using accepted standards of style and citation can benefit you as a writer as well. When your references are clearly annotated within your work, you can see where your source material appears, making it that much easier to edit, update, and expand your work. By following accepted standards to present your work in a manner that is accessible to readers, you also enhance your credibility as a writer and researcher. When your readers can easily identify and check your sources, they are more likely to accept you as a member of their discourse communities. This is especially important in an academic environment, where your readers are likely to investigate your work as a potential source for their own research projects. To put it bluntly, careful adherence to accepted style conventions in academic writing can mean the difference between great success and total failure. In this unit, we will review the concept of plagiarism and discuss how you can use clear, consistent documentation to avoid even the unintentional misuse of source material. We will also review many of the commonly accepted methods of acknowledging and documenting sources used in writing college research papers. We will pay particular attention to the Modern Language Association (MLA) style standards, because this is the most widely used convention in college undergraduate work. This unit will culminate in an opportunity to build your selected source material into a fully developed first draft of your final research paper. By the time you have finished the final activity in this unit, you should have accomplished much of the groundwork for your final research paper. By the time you have finished the work in this unit, you should have a command of the materials and techniques you will need to complete a well-developed academic paper. As a by-product, your final research paper for this course will probably be nearly finished. The final activity in this unit is to develop a final polished and clearly documented research paper that makes full use of the tools, techniques, and products that you have discovered, developed, and organized during the preceding four units.
<urn:uuid:6c8e8ffc-8679-4bca-ae78-51752aa9d7bd>
CC-MAIN-2022-33
https://quillbot.com/courses/research-based-writing/chapter/introduction-to-writing-the-research-paper-and-acknowledging-your-sources/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.96557
521
2.859375
3
-We measured in each chemical and added water besides, HCl we added NaOH. Next, we measured the water temperature to begin with then added the substance to it to determine the finally temperature. We minus the initial and finally to decide if the reaction is exothermic and endothermic. 5. Describe the anticipated temperature change of a system in which an exothermic process is taking place. Calorimetry 23.04.2011 Introduction: An experiment to determine the efficiency of thermal energy gained while heating water by burning alcohol. Aim: To calculate and analyse the efficiency of the energy transfer when heating water in a calorimeter. Hypothesis: There will be an energy transfer when the alcohol is burned to heat the water. Materials: • Clamp • Spirit burner • Scales • Thermometer • Calorimeter • 30cm3 distilled water Method: • The clamp was set up to hold the calorimeter. • 30cm3 of distilled water was poured into the can. When the fuels combust, oxygen and fuels react, and heat released. The water then absorbed the heat from the combustion. In this experiment the calorimeter of energy is used to measure the temperature of the heat that is released from the cashew. The equation to find the energy produce during ( b) What was the percentag e excess of the excess reactant used? ( c) What is the deg ree of completion of the reaction, expressed as the moles of NaOC l formed to the moles of NaOCl that would have formed if the reaction had gone to completion? ( d) What is the y ield of NaOCl per amount of Chlorine use ( on weig ht basis)? (e) What was the extent of reaction? Prob.4 I n a process for the manufacture of chlorine by direct oxidation of HC l with air over a catalyst to form Cl2 and H2O ( only), the exit product is composed of HCl (4.4% ), Cl2 ( 19.8% ), H2O ( 19.8% ), O 2 ( 4.0% ) and N2 (52.0% ). The salts will be dissolved in distilled water by small quantities until the reaction reaches When ionic compounds dissolve in water, they either absorb energy from or release energy to the surroundings. If a chemical reaction absorbs heat from the surroundings, it is an endothermic reaction. If a solution releases heat to its surroundings, it is an exothermic reaction. The enthalpy of dissolution is the enthalpy change associated with the dissolution of a substance in a solvent at a constant pressure. The change in enthalpy relies on the concentration of the salt solution, because different concentrations will produce different enthalpies. hoSpecific heat capacity in liquids Specific heat capacity in liquids How do liquid filled radiators work and what are the useful properties of these liquids? Liquid-filled electric radiators are sealed units that have an internal heating element that releases heat through the outer case; however the elements are put in a liquid such as: oil, water or heat transfer agent. Depending on the design of the radiator, the heat generated can be through radiation or a combination of radiation and convection (1). (10) (10) The liquid used is anti-freeze which is made up of ethylene and propylene glycol (13). Ethylene glycol is mixed with water so it is 50% of each liquid in the solution and has the highest boiling point than any other radiator fluid (5); its boiling point is 197.3°C and has a melting point of -12.9°C (12). This is done by a procedure called refluxing. Refluxing is the process of heating a product to the boiling point and re-condensing the vapor continuously. The procedure halogenation is the addition of a halogen to a π bond forming a halo alkane. In this synthetic reaction bromine was used in the process called bromination. The bromine is acting first like an electrophile, and then after bromine has broken the π bond, a carbocation has formed, and a bromide ion has been created, the bromide ion then acts as the nucleophile and forms a bond with the carbocation. Then the second process is after we get the processed and filtered coal, gas or water or carbon dioxide can be added to balance the amount of carbon monoxide and hydrogen. Then the hot gasses pass over a catalyst. It causes the carbon monoxide and hydrogen condenses into the long hydrocarbon chains and water. The hydrocarbon chains can be used to substitute oil such as gasoline. The water from this process can be recycled and use for steam in the beginning of the process. A reaction in which a substance reacts with oxygen and produces water as one of the products is often referred to a s Combustion reaction. Identify the combustion reactions from the reactions shown on this worksheet. 22. Acid-base (or neutralization) reactions are recognized by the presence of an acid in the reactants, and water in the products. Identify the acid-base reactions from the reactions shown on this worksheet.
<urn:uuid:0dab9646-ec4e-40a5-a2bb-86855d051ca5>
CC-MAIN-2022-33
https://www.antiessays.com/free-essays/Energetics-Experiment-16010.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.936744
1,078
3.546875
4
Authors: M. Naveena, P. Madhavi, M. Meghana, Dr. Syed Jahangir Badashah Certificate: View Certificate The aim of the proposed project is to use a mobile phone to drive a car. The project necessitates the use of two mobile phones, one to control the robot and the other to deliver DTMF signals to the robot vehicle. The commands are received by a DTMF decoder connected to an 8051 microcontroller, which then controls the vehicle movement with the help of a motor driver. Thus, with the motor driver IC, two DC motors enable vehicle movement based on commands supplied from the phone. The power source is a battery. New technologies can be implemented using a robotic vehicle. The Dual Tone Multi Frequency (DTMF) system is utilised to control the robot. In everyday life, DTMF technology can be valuable. To this generation, DTMF technology is unrivalled. The science of Digital Signal Processing underpins DTMF technology. Previously, a Radio Frequency circuit was employed for wireless control, but it had a significant disadvantage in terms of range. As a result, it restricts control and has a negative impact on the vehicle\'s performance. DTMF, on the other hand, transforms this deprivation of the Radio Frequency circuit into domination. It gives you a wider range of options for working and produces better results. The phone in the microcontroller is used to operate and maintain this system. The remote handling operation of a robot using Dual Tone Multi Frequency is referred to as wireless communication. An Embedded System is a combination of computer hardware and software, as well as mechanical and other components, that is designed to execute a certain task. An embedded system is not processing-only computer, nor is it a PC or UNIX software system, nor is it a traditional commercial or scientific application. There are two types of embedded systems: high-end and low-end. High-end embedded system having 32-bit or 64-bit controllers and an operating system. Lower-end embedded systems - Typically, 8,16-bit controllers are utilised with limited operating systems and hardware layouts created specifically for the purpose. The purpose of this paper is that the robot is operated using DTMF technology, which allows it to be commanded through a GSM network. The phone's keypad serves as a remote control for the vehicle's movement. As it is not an Automated Guided Vehicle (AGV), the vehicle will be operated manually. The Robots which are controlled by wireless communication use radio frequency circuits, but they are having some disadvantages like limited operating range, a limited frequency range, and limited control. It offers reliable control and a working range as large as the service provider's coverage area. III. RESEARCH METHODOLOGY The approaches utilised for the design of the hardware and software pieces are described in this study. A block diagram is used to plan out project operations. To alleviate this problem, a radio frequency circuit is employed for a short distance. The usage of Dual Tone Multi Frequency is for long-distance communication. The main goal of this project is to use Dual Tone Multi Frequency to drive a car. A. Components Required The three-terminal positive regulators of the LM78XX/LM78XXA series are available in the TO-220/D-PAK package and with a variety of fixed output voltages, making them suitable for a wide range of applications. They can deliver over 1A output current if appropriate heat sinking is given. Although these devices are generally designed as fixed voltage regulators, they can be used in conjunction with external components to achieve variable voltages and currents. The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory. The device is manufactured using Atmel’s high-density non volatile memory technology and is compatible with the industry standard 80C51 instruction set and pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional non volatile memory programmer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications. 3. Push Buttons A basic switch mechanism for controlling some part of a machine or process is a push-button (sometimes written pushbutton) or simply button. Buttons are commonly composed of hard materials such as plastic or metal. The surface is usually flat or contoured to allow the human finger or hand to easily depress or push it. The "pressing" of the button is referred to by a variety of names, including press, depress, mash, and punch. 4. DTMF Decoder The MT8870D/MT8870D-1 is a full-featured DTMF receiver that includes both a band split filter and a digital decoder. The audible sounds you hear when you push keys on your phone are known as dual-tone multi-frequency (DTMF, sometimes known as touch-tone). The tone generator (top) is controlled by a DIP switch and a 5589 chip. Through the speaker, you can actually hear the tones. The 8870 is used in the bottom circuit to decode a tone and display the number associated with it on the 7-segment LED. Many people are familiar with touch-tone (telephone), and it is a mature technology that can be easily implemented with off-the-shelf, single-chip, low-cost components. For these reasons, DTMF is commonly used in telephone-based remote control applications (e.g., accessing messages from an answering machine, requesting account balance information from your bank's database). 5. L293D MOTOR DRIVER The integrated circuit L293D is a dual H-bridge motor driver (IC). Because they take a low-current control signal and convert it to a higher-current signal, motor drivers operate as current amplifiers. The motors are driven by this increased current signal. Two DC motors can be driven in both forward and reverse directions simultaneously in the common mode of operation. Input logic at pins 2 and 7 and 10 and 15 can control the activities of two motors. The appropriate motor will be stopped if input logic 00 or 11 is used. The linked driver is enabled when the enable input is high. As a result, the outputs become active and work in sync with their respective inputs. 6. DC MOTOR An electric motor that runs on direct current (DC) is known as a DC motor. When a current-carrying conductor is put in an external magnetic field, it will experience a force proportional to the current in the conductor as well as the strength of the external magnetic field. We know that with magnets, opposite polarities (North and South) attract, whereas like polarities (North and North, South and South) repel. A semiconductor light source is a light-emitting diode (LED). LEDs are rapidly being employed for lighting and as indication lamps in a variety of applications. When a light-emitting diode is forward biased (turned on), electrons within the device can recombine with holes, releasing energy in the form of photons. Because LEDs have a small surface area (less than 1 mm2), integrated optical components can be employed to alter the pattern of light they emit. Light-emitting diodes are utilised in a variety of applications, including aviation lighting, car lighting, and traffic signals. LEDs' small size, narrow bandwidth capability, fast switching speed, and exceptional dependability have enabled the development of novel text and video displays and sensors, while their high switching rates are also valuable in sophisticated communications technologies. To convert AC to DC, diodes are employed. When employing any type of diode, three things must be kept in mind. a. Maximum forward current capacity b. Maximum reverse voltage capacity c. Maximum forward voltage capacity Diodes with similar capacity can be substituted for one another. Aside from that, a higher-capacity diode can be used in place of a lower-capacity diode, but a lower-capacity diode cannot be used in place of a higher-capacity diode. An electronic component that opposes current by producing a voltage which is dropped between its terminals that is proportional to the current is called as Resistor. As defined by Ohm's law: IR = V Electrical networks and electronic circuitry both employ resistors. They're found in almost every piece of electrical equipment. Resistors are distinguished by their resistance and the amount of power they can dissipate. Temperature coefficient, noise, and inductance are some of the other qualities. Critical resistance, the value below which power dissipation limits the maximum allowed current flow and over which applied voltage sets the limit, is less well-known. Critical resistance is determined by design and is dependent on the materials that make up the resistor as well as its physical size. Resistors, like hybrid and printed circuits, can be used in integrated circuits. Equipment designers must consider the size and location of leads (or terminals); resistors must be physically large enough to avoid overheating when dissipating their power. When a voltage V is put across a resistor's terminals, a current I flows through the resistor in direct proportion to the voltage. A capacitor has two terminals. They are one of the most basic passive components simultaneously with resistors and inductors. Capacitors have similar to a fully charged electric battery. A capacitor, also known as a condenser, is an electrical component that consists of two conductors separated by a dielectric. An electric field exists in the dielectric when the conductors have a voltage potential difference. This field stores energy while also exerting a mechanical push on the plates. The effect is strongest between conductors that are wide, flat, parallel, and closely spaced. Capacitance, which is measured in farads, is the only constant parameter that defines an ideal capacitor. In practise, a little amount of leakage current travels through the dielectric between the plates. The analogous series resistance is introduced by the conductors and leads, and the dielectric has an electric field strength limit as a result in breakdown voltage. An electrical battery is made up of one or more electrochemical cells that work together to transform chemical energy into electrical energy. Many domestic and industrial applications now employ batteries as a power source. Batteries can be used once and then discarded, or they can be refilled and used in standby power applications for years. ???????B. Software Used Keil software is used for implementation of our project. Keil µVision2 is a free programme that alleviates many of the problems that an embedded programme developer faces. This programme is an integrated development environment (IDE) that includes a text editor, a compiler, and the ability to convert source code to hex files.You can create software applications with the Vision Project Manager and Run-Time Environment by leveraging pre-built software components and device support from Software Packs. Libraries, source modules, configuration files, source code templates, and documentation are among the programme components. To support a wide range of devices and applications, software components might be generic.The integrated Vision Editor has all of the basic capabilities of a source code editor and used while debugging. For C/C++, colour syntax highlighting, text indentation, and source highlighting have been streamlined. Keil software is a cross compiler. 2. Concept of Compiler Compiler is a program which is used to convert the high level language to byte code , machine language or object based code. The compiler analyses the whole source code and then it collects and rearrange the instructions without modifying the definition of the code. We have interpreters also but they are different from compilers. Interpreter is a program that directly executes the instructions but compilers analyses and executes each line of the source code. The programs which are created by compilers can run faster than the same programs executed by interpreters. 3. Concept of Cross- Compiler Compilers are programmes that run on one machine and generate code for target microprocessor Ike 8051 on the host processors. A cross compiler is one that is capable of producing executable code for platforms other than the one on which it is now executing. To build executables for installed systems or multiple platforms, cross compiler tools are utilised. Cross development refers to the process of writing code for another environment while working in one environment. Cross compiler is the name of the compiler used for cross development. The compiler s used for cross development are called cross compilers. 4. Keil c cross Compiler Keil is a German based software development company which provides several tools like IDE, Project manager, simulator, debuggers, c compilers mainly three tools The C source code is compiled into an object file using a compiler. To make an absolute object module appropriate for our in-circuit emulator, we need a linker. 5. Building an Application in µVision2 a. First select project (any appropriate name for the project to be created) b. Select project (Build target or rebuild all target files. Vision2 assembles, connects, and compiles the files in your project.) 6. Creating our Own Application in µVision2 Now we create a new project in µVision2. For that we must follow below steps: a. Select Project - Choose New Project from the drop-down menu. b. Choose a directory and type the project file's name. c. Select Project - Select Device from the Device Database and choose an 8051, 251, or C16x/ST10 device. d. To add to the project, create source files. e. Select Project - Targets, Groups, and Files from the drop-down menu. Select Source Group1 under Add/Files and add the source files to the project. f. Set the tool choices under Project - Options. All special parameters are set automatically when you pick the target device from the Device Database. The memory map of your target hardware is usually all that needs to be configured. For most applications, the default memory model parameters are ideal. g. Select Project - Select Rebuild all target files or Build target from the Project menu. 7. Debugging an application in µVision2 Now we are debugging the created application using Microvision2. To debug follow below steps: a. Select debug - Start/Stop Debug Session is visible, select it. Now here breakpoints comes in debugging. Breakpoints are points in the program that makes the program execution to stop or halts. Check for breakpoints and perform required insert or remove operations to fix b. By using Step toolbar buttons for analyses of program in single-step. Then enter G, main in the output window for execution of the main C function in the program. c. Now search for Serial Window and open it using #1 button on the toolbar. d. For debugging the program use standard points like Step, Run, Step-out, Go, Break, step over and so on. 8. Starting Microvision2 and Creating a Project µVision2 is popular windows application. a. First click on the program icon b. For creating a new project select New Project from the Project menu of Microvision2. It opens default Windows dialog which asks for project file name. c. We should use separate folders for every project we create. d. To maintain separate folders- directly click on Create New Folder to get an empty folder. e. Then select the created empty folder and save the new project with the file name like Project1 or Project Dtmf. After giving the file name µVision2 creates a new project file with the given file name. f. This project file contains default targets and group name of the file. They are visible in the Project itself. Select a CPU for your project from the Project – Select Device for Target menu. The Vision2 device data base is displayed in the Select Device dialogue box. Simply choose the microcontroller you want to use. The Philips 80C51RD+ CPU is used in our examples. This option configures the 80C51RD+ device with the relevant tool options, making tool configuration easier. 10. Building Projects and Creating a HEX Files a. Open the created project in the keil IDE. b. Click the drop-down box menu in the project. Then select the Targets option. c. We must translate the source files and application line by clicking on the Build Target icon. d. If the application has any syntax errors. They are visible by Microvision2 in the Output window. Check for the errors and warning if any by double click on the message to display in the source file in the Microvision2 editor window. Make suitable corrections according to the errors and warning then the application is ready to debug. e. After testing the application, it's time to create an Intel HEX file for downloading the software into an EPROM programmer. f. When Create HEX files under Options for Target – Output is enabled, Vision2 creates HEX files throughout each build session. g. When you specify the programme under the option Run User Program #1 following the make process, your PROM programming utility will start. 11. CPU Simulation µVision2 simulates up to 16 Mbytes of memory, from which read, write, and code execution access can be mapped. Illegal memory accesses are caught and reported by the µVision2 simulator. The simulator supports the integrated peripherals of the many 8051 versions in addition to memory mapping. The Device is used to configure the on-chip peripherals of the CPU you've chosen. 12. Database Selection When you create your project aim, you have made a choice. For additional information about choosing a device, see page 58. The Debug menu allows you to select and display the on-chip peripheral components. The controls in the dialogue boxes can also be used to adjust the aspects of each peripheral. 13. Start Debugging The Debug - Start/Stop Debug Session Command activates Vision2's debug mode. Vision2 will load the application programme and perform the start up code based on the Target – Debug Configuration Options. Vision2 saves the editor screen layout and restores the last debug session's screen layout. If the programme execution halts, Vision2 displays CPU instructions in the disassembly window or opens an editor window with the source text. A yellow arrow indicates the next executable statement. Most editor features are still available during debugging. 14. Disassembly Window The programme execution is shown in assembly code or mixed in with the source code in the Disassembly Window (device dependent). All debug-stepping commands function on the assembly level when the Disassembly Window is the active window. Open the disassembly Window by view menu then disassembly window: All programme step instructions function on the CPU instruction level rather than programme source lines if the Disassembly Window is selected as the active window. Using toolbar buttons or context menu commands, you can pick a text line and set or modify code breakpoints. To change the CPU instructions, we can use the dialogue Debug – Inline Assembly... This allows you to rectify errors or make temporary changes to the debugged target programme. There are numerous sample programmes available to assist you in getting started with the most common embedded 8051 devices. Your 8051 device's on-chip peripherals (I2C, CAN, UART, SPI, Interrupts, I/O Ports, A/D Converter, D/A Converter, and PWM Modules) are correctly simulated by the Keil Vision Debugger. Simulation aids in the understanding of hardware setups. 15. Embedded C The C Standards Committee created Embedded C as a set of language extensions for the C programming language to solve issues of similarity between C extensions for different embedded devices. Fixed-point arithmetic, named address spaces, and basic I/O hardware addressing are among the features not accessible in standard C. The main() function, variable definition, datatype declaration, conditional statements (if, switch case), loops (while, for), functions, arrays and strings, structures and union, bit operations, macros, and so on are all used in embedded C. Embedded processors are widely used in passenger cars, mobile phones, medical equipment, aerospace systems, and defence systems, and even common household appliances like dish washers, televisions, washing machines, and video recorders now contain at least one of these devices. The above block diagram represents the way in which the components are connected together for achieving the common goal or output for the system. Here the 6v Battery is used for power supply to the system. Diode is used for converting AC power to DC power if input power supply is AC. The commands are received by a DTMF decoder connected to an 8051 microcontroller, which then controls the vehicle movement with the help of a motor driver whereas the DTMF (Dual Tone Multiple Frequency) decoder IC is used to decode keystrokes similar to those on a telephone and Because motor driver IC take a low-current control signal and convert it to a higher-current signal, they operate as current amplifiers. The motors are driven by this increased current signal. From the work we have done, it is concluded that mobile based operating vehicles can be designed using Microcontroller (AT89S52/AT89C51), DTMF decoder(MT8870D/MT8870D-1), IC 7404, two mobile phones and Motor Drivers(L293D). The commands are received by a DTMF decoder connected to an 8051 microcontroller, which then controls the vehicle movement with the help of a motor driver. Thus, with the motor driver IC, two DC motors enable vehicle movement based on commands supplied from the phone. The power source is a battery. The commands are received by a DTMF decoder connected to an 8051 microcontroller, which then controls the vehicle movement with the help of a motor driver. Thus, with the motor driver IC, two DC motors enable vehicle movement based on commands supplied from the phone. The power source is a battery. Badashah, Syed Jahangir, Mohd Khaja Moinuddin, and D. Maheswara Reddy. \"Self-Driving RC car that Reaches Specified Destination.\" Awab, F. & Jovita, S. (2010). Cell Phone Operated Robotic Car. International Journal of Scientific & Engineering Research, 25(4), 55-67. Ashish, H. & Rashika, S. (2012). An unmanned vehicle which can be used especially for ground combat. International journal for computer telecommunication engineering, 2(5), 123-133. Sabuj, K. & asika, J. (2013). An unmanned vehicle which using microcontroller. International journal for computer telecommunication engineering, 1(2), 78-81. Das, M. Sanaullah, H. M. G.,Sarower, J. & Hassan, M. M. (2010). Development of a cell phone based remote control system: an effective switching system for controlling home and office appliances. International Journal of Electrical &Computer Sciences IJECS, 9(10), 37-39. Dharmani, C.C. (2009).Design with microcontrollers: IR Remote Controlled Car (PWM motor control using ATmega8). Manjesh N., Sudarshan Raj, Smart Helmet usingGSM & GPS Technology for Accident detection andReporting System, International Journal of Electricaland Electronics Research, 2, 4 (2014). Dr S Shafiulla Basha, Dr B P Santosh Kumar and Dr Syed Jahangir Badashah,“Smart Helmet for Bike Riders Safety”, International Journal for Research in Applied Science & Engineering Technology, February 2022, Volume 10, Issue 2, pages 441-447 Abhinav Anand, Alcoholic detection, Department ofElectronics and Telecommunications, IJEETC, 2015. Mohd Khairul, Afiq Mohd Rasli, Smart Helmet withsensors for accident prevention, ICEESE, 2013. G Kalyan, V Sai Nithish, B Srikar and S J Badashah, “Design And Development Of Traffic Control System Using Image processing” International Journal for Research in Applied Science & Engineering Technology, (IJRASET) ISSN: 2321-9653, June 2021, Volume 9 Issue 6 pp 3247-3252 Copyright © 2022 M. Naveena, P. Madhavi, M. Meghana, Dr. Syed Jahangir Badashah. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
<urn:uuid:e499a6a3-836a-448b-86c0-83cc47bf2225>
CC-MAIN-2022-33
https://www.ijraset.com/research-paper/remote-vehicle-control-through-cell-phone-using-dtmf
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.889964
5,313
3.1875
3
Alright, so we just talked about working with all of those team members. It's a lot of people to communicate with. So how do we communicate with them? So, we're going to use an organized framework to communicate a patient's situation. We call it SBAR for short. Okay, so first I'm gonna explain these steps, then we're gonna talk through an example. So first, let's look at S, situation in the SBAR framework, so first of all, situations saying, "Hey, why are you calling? Who you are? Where you're located? What's going on with the patient?" Such as what's the situation basically. Next, let's look at the background. So, what's the background going on? What's going on with that patient? Do they have diabetes? Do they have hypertension? Did they have surgery just a few hours ago? What's the information that we need to relay to the health care provider about the background of this patient. So, after our situation, we tell them what's going on, some background information, we're gonna then talk about the assessment details. So, this is the nitty-gritty such as my patient's blood pressure is really low; it's this over this. This is information we need to give, so this is the assessment details. Maybe labs, blood pressure, heart rate changes, saturation oxygen changes, it could be assessment details such as their levels of consciousness has changed, so these are the assessment details that us as nursing, are going to relay. And next, what is our recommendation such as, hey, doctor, I noticed that this patient's blood pressure is very low, what do you think about administrating this, so just know, as a new nurse, and sometimes, it's a seasoned nurse, we don't always have the recommendation for our patient, but know, that we can suggest and have that open dialogue with our physician to figure out the best treatment for them. Alright, so now that we've talked about the situation, the background, those assessment details that are important and the recommendation, let's walk through one. So, first of all, let's give you the situation as Miss Jones has a blood pressure of 85/46. Okay, so I know you may be new to nursing or maybe you're seasoned, but 85/46 is not a good thing. We don't like that, so this is a very low blood pressure, so here is the situation that we're communicating to the health care provider. Also, it's great for the physician to know, "Hey, the background information is they were admitted two hours ago after a spinal surgery." The reason why this information is important because some of those other pieces of the patient case, can make a difference in the health care provider's decisions on how they treat. Alright, next, we've talked about, "Hey, Mrs. Jones, patient's blood pressure is low, they were admitted two hours ago after a spinal surgery and this is the assessment details that I'm seeing, "Hey, she's light-headed." "Hey, the heart rate is tachycardic at a 112 beats per minute, so what am I going to recommend for that? A fluid bolus." So now you can kind of see how that is walked through each piece, so it may sound a little bit like this. "Hey, Dr. Brown, Mrs. Jones has a low blood pressure of 85/46. She was admitted to the unit about two hours ago after spinal surgery. She says she's a little bit light-headed. Her heart rate is high at 112 beats per minute and you think we should consider a fluid bolus?" So, having communication this way in the SBAR format, you can see it gives you clear information. It's concise and it communicates details that the health care provider would need to know.
<urn:uuid:36a71cb0-080e-4250-8af6-6345bbb0cacf>
CC-MAIN-2022-33
https://www.lecturio.com/medical-courses/situation-background-assessments-recommendation-sbar-nursing.lecture
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.964075
919
2.859375
3
There is a view that we blame everything on teething. When a baby or toddler is grouchy, not sleeping or not eating, it is all too easy to say ‘ah, she must be teething’. But whilst there are, of course, other reasons for our little ones to be unhappy or lose their appetite, the reality is that teething can be a really disruptive process. Chinese medicine can explain perfectly why this is, and give us some clues as to what to do about it. Firstly, the process by which a tooth works its way up through the gum requires a surge of yang qi (heat) in the body. This is the equivalent to athletes needing to warm up before a race. In order to run their fastest, their body needs to be warm beforehand. In order for a tooth to emerge, a baby must produce some extra heat to provide the motive force for the process. This heat is necessary. However, it can also explain many of the common ‘symptoms’ of teething, such as: - Red cheeks - Disturbed sleep - Restlessness and agitation - Raised temperature - Smelly stools In children who are already a bit too hot, the teething process tends to cause quite a lot of disruption. But for children who are energetically damp or cold, the extra heat in the body can actually be useful. It can enable the body to ‘throw off’ damp that has been lingering. This explains another common teething ‘symptom’ which is: - Snotty nose Secondly, the acupuncture meridians (channels) of the Stomach and the Large Intestine both run through the gums. When a new tooth is emerging, the qi in these channels temporarily becomes disrupted and blocked. It can no longer flow smoothly. This explains some other common ‘symptoms’ of teething, such as: - Loss of appetite - Loose stools So, is there anything to be done to help make this transition an easier one? The answer, thankfully, is a definite yes! Here are the most common pieces of advice I give to parents whose children are having a difficult time with teething: - Trust your child’s instinct to lessen their food or milk intake during this time. It will help to relieve the stagnation in their digestive system, which comes from the tooth cutting through one of the key digestive meridians. Babies and children of this age have an innate instinct for survival. They will make up for it once the tooth has come through! - Foods should be kept simple and light. This means avoiding red meat and spicy foods, and keeping cheese and sugary products to a minimum. - Make sure the baby or child has good breaks (ideally a minimum of 2 hours) between meals or feeds, so they have time to digest one before taking in the next. - Massage the acupuncture point LI 4 hegu on the hand. It really helps to ease the pain of teething. - If your child has red cheeks, feels hotter than normal to touch and is generally restless and irritable, massage this acupuncture point (known as Kidney 1 yongquan) at the bottom of the foot. It will help to draw the heat down from the top of the body. - Whilst hot, restless children may need opportunities to run around outside, most children also need more rest when they are teething. In Chinese medicine, teething is seen as an outward manifestation of a strong developmental phase. This means children need to conserve their energy rather than expend it on too many external activities. Teething may be an unpleasant experience (although, thankfully, one that we don’t remember!) but it certainly does not need to be a tyranny. Having an understanding of the process, and following the simple guidelines above, can enable parents to nurture their children through this developmental stage. We can’t take away the pain, but we can ease it and, most importantly, be alongside our children through it.
<urn:uuid:3a54f830-4363-4d6b-8ebd-506853e18aef>
CC-MAIN-2022-33
https://www.rebeccaavern.com/tag/acupressure/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.955709
852
3.09375
3
Type of Insurance Requested The Ordinance and Law Exposure There are a myriad of building codes that may come into play after a building has been damaged or destroyed. Many city governments follow the “universal” building code established by the International Code Council (ICC). The ICC code was implemented in 2000, so some cities may instead be following an older set of codes established by the Building Officials and Code Administrators (BOCA), the International Conference of Building Officials (ICBO), the Southern Building Code Congress International (SBCCI), or the Council of American Building Officials (CABO). And that’s just the building code. There are separate codes for electrical, plumbing and mechanical (heating and air conditioning). The requirements of federal laws, such as the Americans with Disabilities Act, must also be considered. Along the Texas coast, the Texas Windstorm Insurance Association enforces state laws regulating construction in hurricane-prone areas. Codes are not necessarily consistent throughout a city or county. The code for one neighborhood may be different from the code applicable to a neighborhood a few blocks away! To make matters more complicated, growing cities and towns can annex new territories into their city limits at any time. Buildings within those annexed areas that were constructed years ago can be forced to comply with the city building codes when a building permit is required for reconstruction or repair after a loss. Building laws generally create three separate and distinct post-loss requirements for a building owner. These building code requirements create the following four exposures that are not covered by the typical insurance policy because they are excluded by the Ordinance and Law exclusion: Coverage for Ordianance and Law Exposures The building and business personal property coverage form contains some limited additional coverages for these exposures. The additional coverage for Increased Cost of Construction provides up to $10,000 or 5 percent of the building limit to cover increased costs of construction to comply with building codes following damage caused by a covered cause of loss. The coverage applies only if the optional coverage replacement cost has been selected, and it does not cover the expense for demolition or reconstruction of undamaged portions of the building, or the cost to assess and respond to pollutants, fungus or hazardous materials. Coverage for these items, including a higher limit for increased costs of construction, can be obtained with endorsement CP 04 05 (Ordinance or Law Coverage). This form contains three coverages: Coverage A – Coverage for Loss to the Undamaged Portion of the Building; Coverage B – Demolition Cost Coverage; and Coverage C – Increased Cost of Construction Coverage These coverages can be purchased separately, but should be purchased together in all cases. The limit for Coverage A is included within the building limit shown in the Declarations. The limits for Coverages B and C can be separate or combined, the latter being preferred in case the amount estimated for one or the other is inadequate. Business Income Considerations If the insured purchases Ordinance or Law Coverage with endorsement CP 04 05 and also carries business income coverage, the insured should extend the business income coverage with endorsement CP 15 31 (Ordinance or Law – Increased Period of Restoration). This endorsement covers the loss of business income during the additional time required due to the enforcement of any building ordinance or law. Determining Limits for Ordinance and Law Coverage How much additional insurance does a policyholder need for Coverages B and C? The only way to begin the process of determining the amount needed for Coverage C is to consult with a local architect or general contractor, or meet with the fire marshal and/or the building code official in the city where the building is located. The limit for Coverage B should be the amount a demolition contractor would charge to demolish 50% of the building and clear the site. How much does this coverage cost? The cost for Coverage A is an additional 15 percent of the premium to insure the building. The building rate applies to the amounts selected for Coverage B and C. Whose job is it to determine the proper amount of insurance needed to cover current building codes? Ultimately it is the policyholder’s responsibility to establish property values and select the amount of insurance, but that doesn’t keep you safe from an E&O claim if the amounts are insufficient. Your proposals should clearly state that it is the customer’s job to tell you how much insurance they need.
<urn:uuid:639792b0-4a76-4be9-b061-d4de8a24f35d>
CC-MAIN-2022-33
https://www.sheanerinsurance.com/ordinance-and-law/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00288.warc.gz
en
0.941806
911
2.703125
3
The types of barley grown fell into three groups: |Hordeum hexastichum||six-row barley| |Hordeum distichum||two-row barley| |Hordeum coeleste||naked barley| |"The Brewing Industry" by Julian L. Baker, 1905, page 14.| Large quantities of foreign barley were imported into Britain for malting. California and the Mediterranean were the main sources of cheaper malt. Top-quality, very pale malt, was made from barley imported from central Europe, usually Bohemia, Moravia or the Saale district. The latter were mostly used in the best Pale Ales, such as Bass. Mediterranean barley, often given the generic name of Smyrna, was extremely popular because of its price and adaptability. It was widely used in Light Pale Ales, though not the poshest examples. According to Barnard, beers benefitted from its use: “all beers are cleaner, sounder and more brilliant when a portion of Smyrna malt is blended with the heavier English grain.” In addition, Smyrna malt was the most economical available. |Home production and imports of barley 1880 - 1914| |Average Price per Cwt.| |Year||Acreage||Estimated Produce Cwts.||s.||d.||Imports Cwts.||Import %||Total cwts.| |Brewers' Almanack 1912, page 158.| |Brewers' Almanack 1922, page 118.| |Brewers' Almanack 1955, page 66.|
<urn:uuid:6c7f8b2e-b818-491b-be20-dafb3bb0fde9>
CC-MAIN-2022-33
http://barclayperkins.blogspot.com/2022/05/barley-1880-1914.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.7467
933
3.125
3
The REAL ID Act was passed by Congress in 2005 The National Commission on Terrorist Attacks upon the United States was born In response to the September eleventh terrorist attack on the twin towers in New York City, a nine eleven commission was formed called the The National Commission on Terrorist Attacks upon the United States, on November 27, 2002. Their main goal was to prepare a full and complete account of the circumstances surrounding the September 11 attacks, Including the preparedness and immediate response. The REAL ID Act, which was passed by Congress in 2005, enacted the 9/11 Commission’s recommendation that the Federal Government should set standards for the issuance of sources of identification, including driver's licenses. The Act established minimum security standards for license issuance and production and prohibits Federal agencies from accepting such identifications from states not meeting the Act’s minimum standards. It’s main focus as part of the Emergency Supplemental Appropriations Act for Defense, the Global War on Terror, and the Tsunami Relief Act, law sets identification standards for state driver's licenses used as identification for boarding an aircraft, entering a federal building where identification is required or entering a nuclear power plant. Restrictions on flying Restrictions on federally operated facilities The Real ID Act is intended to combat terrorism, identity theft, and other crimes by strengthening the integrity and security of state-issued identification. The Act calls on states to implement a set of minimum national standards in several areas: So if you plan on entering any federal facility to conduct official business or are currently employed by the federal government, for job security purposes I highly recommend that you don’t procrastinate or delay because if by the specified deadline of October first 2020, not only must all states issue Real ID-compliant licenses or IDs, but individuals must also have visited their state’s driver’s licensing agency and obtained a REAL ID compliant card, or acceptable alternative such as a U.S. passport, if they wish to fly on commercial aircrafts or - Access Federal facilities - Boarding federally regulated commercial aircraft - Enter nuclear power plants Federal agencies, including the Department Of Homeland Security and the Transportation Security Administration, may only accept state-issued driver’s licenses and identification cards as identification, for purposes of accessing federal facilities, including TSA airport security checkpoints. The license or card must be issued by a REAL ID compliant state in accordance with the REAL ID security standards, indicated by the REAL ID compliant star marking. Licenses such as enhanced driver’s licenses (EDL) issued by Washington, Michigan, Minnesota, New York, and Vermont are considered to be acceptable alternatives to REAL ID-compliant cards and will be accepted for official REAL ID purposes. Most EDLs do not contain the star marking. How to apply as a Nevada Resident Currently, the Department of Homeland Security is and will continue to work closely with all states and territories, to provide assistance and guidance to achieve full compliance by the October 1, 2020 deadline. As of September 5, 2019, 50 states and territories are considered to be in full compliance with the REAL ID requirements, and all states are on track to begin issuing compliant licenses and IDs by the October 1, 2020 deadline. Even though it is highly advisable to visit your state’s driver’s licensing agency’s website to find out exactly what documentation is required to obtain a REAL ID, At a minimum, you must provide documentation showing - Full Legal Name - Date of Birth - Social Security Number - Two Proofs of Address of Principal Residence and lawful status. In Nevada You must apply in person and present proof of identity, name change(s), your Social Security number and two residency documents one time only. Generally the same documents used to obtain your Nevada license or ID the first time, must be shown again, plus two other documents indicating your Nevada residential address. There are also fees associated. - Real ID only (Change of Information) is $9.25 for a driver license - ID card $8.25 - Commercial license $13.25 Other driver license/ID changes of information, such as an address change or name change, may be included with no additional fee. There is also no additional charge for a Real ID if you are completing other license/ID transactions such as a renewal or adding an endorsement. The Change of Information fees listed above will apply if you are completing a vehicle registration or other transaction and the Real ID is the only change to your license or ID card. Department Of Motor Vehicles. (2020, January 1). Nevada Real ID. Retrieved March 23, 2020, from Department Of Motor Vehicles: https://dmvnv.com/realid.htm Official website of the Department of Homeland Security. (2020, January 1). Frequently asked questions. Retrieved March 23, 2020, from Homeland Security: https://www.dhs.gov/real-id-frequently-asked-questions.
<urn:uuid:e685d204-4ae0-428a-b2e7-67ecea55d751>
CC-MAIN-2022-33
https://book.batalp.com/news/are-you-real-i-d-ready-17
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.938165
1,020
2.953125
3
Hand tendon repair If any of the tendons in your hand are damaged, surgery may be needed to repair them and help restore movement in the affected fingers or thumb. What are tendons? Tendons are tough cords of tissue that connect muscles to bones. When a group of muscles contract (tighten), the attached tendons will pull on certain bones, allowing you to make a wide range of movements. There are 2 groups of tendons in the hand: - extensor tendons – which run from the forearm across the back of your hand to your fingers and thumb, allowing you to straighten your fingers and thumb - flexor tendons – which run from your forearm through your wrist and across the palm of your hand, allowing you to bend your fingers Surgery can often be used to repair damage to both these groups of tendons. When hand tendon repair is needed Hand tendon repair is needed when 1 or more tendons in your hand rupture (break or split) or are cut, leading to the loss of normal hand movements. If your extensor tendons are damaged, you'll be unable to straighten 1 or more fingers. If your flexor tendons are damaged, you'll be unable to bend 1 or more fingers. Tendon damage can also cause pain and swelling (inflammation) in your hand. Sometimes, damage to the extensor tendons can be treated without the need for surgery, using a rigid support called a splint that's worn around the hand. Common causes of tendon injuries include: - cuts – cuts across the back or palm of your hand can result in injury to your tendons - sports injuries – extensor and flexor tendons can be injured when playing sports like rugby, and the pulleys holding flexor tendons can rupture if you do a lot of strenuous gripping like in rock climbing - animal and human bites – these type of bites can cause tendon damage, and a person may damage their hand tendon after punching another person in the teeth - crushing injuries – jamming a finger in a door or crushing a hand in a car accident can divide or rupture a tendon - rheumatoid arthritis – rheumatoid arthritis can cause tendons to become inflamed which, if severe, can lead to them rupturing Tendon repair surgery Tendon repair may involve a surgeon making a cut (incision) in your wrist, hand or finger so they can locate the ends of the divided tendon and stitch them together. Extensor tendons are easier to reach, so repairing them is relatively straightforward. Read more about how hand tendon repair is performed. Recovering from surgery Both types of tendon surgery require a lengthy period of recovery (rehabilitation) because the repaired tendons will be weak until the ends heal together. Depending on the location of the injury, it can take up to 3 months for the repaired tendon to regain its previous strength. Rehabilitation involves protecting your tendons from overuse using a hand splint. You'll usually need to wear a hand splint for several weeks after surgery. You'll also need to perform hand exercises regularly during your recovery to stop the repaired tendons sticking to nearby tissue, which can prevent you being able to fully move your hand. When you can return to work will depend on your job. Light activities can often be resumed after 6 to 8 weeks, and heavy activities and sport after 10 to 12 weeks. Read more about recovering from hand tendon repair. After an extensor tendon repair you should have a working finger or thumb, but you may not regain full movement. The outcome is often better when the injury is a clean cut to the tendon, rather than one that involves crushing or damage to the bones and joints. A flexor tendon injury is generally more serious because they're often put under more strain than extensor tendons. After a flexor tendon repair, it's quite common for some fingers to not regain full movement. But the tendon repair will still give a better result than not having surgery. Complications can sometimes develop after surgery, such as infection or the repaired tendon snapping or sticking to nearby tissue. In these circumstances, further treatment may be required. Page last reviewed: 6 September 2021 Next review due: 6 September 2024
<urn:uuid:130aee9d-f0ef-4080-9318-53304e0381ca>
CC-MAIN-2022-33
https://developer.api.nhs.uk/widgets/condition/?condition=/conditions/hand-tendon-repair/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.936658
891
3.34375
3
Sustainability has become a popular catchphrase, and implementing environmentally friendly strategies—from recycling to reducing carbon emissions—is fashionable among both consumers and businesses. According to the 2010 BBMG Conscious Consumer Report,1 nine out of 10 Americans identify with the label “conscious consumer,” and feel positively about companies that use environmentally friendly practices. Preserving the environment is not a foreign concept in the oral health care arena. The Eco-Dentistry Association was formed in 2008 to promote green practices in the dental setting (see sidebar), and many companies and clinicians alike are dedicated to sustainable dental practice. For oral health professionals who are interested in making their practices more eco-friendly, the process begins with the three “Rs”—reduce, reuse, and rethink. First, clinicians need to reduce the amount of disposable items purchased for use in the dental practice. For instance, eliminating bottled water from the office, and instead offering branded bisphenol-A (BPA)-free water bottles placed next to a filtered water station, is an environmentally sound strategy.2 Second, dental team members, including office staff, need to consider reusing items they already have and purchasing reusable products when possible. For example, branded cloth bags can be purchased to provide patients with oral health supplies, instead of plastic bags that eventually end up in landfills. The third suggestion is to rethink daily consumption habits, both inside and outside of the treatment room. This habit is also referred to as precycling, which focuses on preventing the need for recycling by making purchase decisions that support responsible products and packaging. Conscious efforts can be made to decrease dental practices’ carbon footprints. For example, energy efficiency can be maximized by installing eco-friendly light bulbs and by turning off the lights when an operatory is not in use. Consider the use of energy-saving compact fluorescent light bulbs (CFL), which last 8 times to 12 times longer, cost less per hour, and produce 70% less heat than incandescent bulbs.3 While they save energy and money, CFLs require special handling for disposal.3 Another green practice is to order and use rechargeable batteries for cordless equipment, including curing lights, caries detection devices, intraoral cameras, and other portable devices. Digital charting is another way dental practices can become more environmentally friendly. Computerized charting saves 10,000 sheets of paper per year in the average dental practice.4 Further enforce this by replacing paper invoices, billing statements, and bulk mail with electronic communications, such as text messages and emails. Use recycling bins for paper, plastics, and glass. As dental offices make the shift to electronic filing systems, more than 200,000 trees could be saved each year.4 Finally, partner and purchase products from credible manufacturers that demonstrate a high consciousness for the environment on a corporate level. Look for and utilize recyclable packaging materials, such as boxes/cartons/containers/displays; aluminum tubes; plastics; packing materials; and soy-based inks. Most practices today use digital radiography over traditional X-rays, which reduces radiation exposure by 90%, and also eliminates the need for lead foils and toxic photo development liquids that previously required special handling.5 Use biodegradable, nontoxic “green” certified disinfection and cleaning products. Products registered with the United States Environmental Protection Agency ensure the highest standards of safety to protect human health and the environment. Steam-based instrument sterilization or dry heat techniques that do not require harmful chemicals are other positive changes. Instruments can be prepared for sterilization with hospital-grade surgical cloth and tape. If this is not possible, the thousands of sterilization pouches used every year in dental hygiene practice may be recyclable. EDUCATE TO DIFFERENTIATE Effective communication is integral to the success of precycling—the entire dental team needs to be involved. Once a precycling approach is enacted, patients should be informed of these efforts. There is already a high expectation among consumers for corporate behavior to include at least minimal standards of environmental protection. For patients, choosing an environmentally conscious dental practice significantly impacts their local environment—including the air, water, and soil. More than 50% of the general population expects to increase their involvement in protecting the environment over the next 5 years.2 Patients who are committed to sustainable living prefer an eco-friendly dental office because they know their choice of health care providers reflects their shared values of health, wellness, and planetary consciousness. In 2008, National Geographic initiated a partnership with GlobeScan to develop Greendex—an international research program to measure and monitor the progress toward environmentally sustainable consumerism.6 The consumer actions evaluated by Greendex include repairing items rather than replacing them, using cold water to wash laundry, and choosing green products rather than environmentally unfriendly ones. Choices controlled by circumstances, such as the climate consumers live in and the availability of green products and public transportation, were also evaluated. For the fourth year in a row, American consumer behavior ranked as the least sustainable of all the countries surveyed since the inception of the study. This leaves incredible opportunity for oral health clinicians to demonstrate their commitment to the environment by offering eco-friendly dental services. By aligning with patients’ desires to live a green lifestyle, dental professionals will be well served by moving to more sustainable practices, both personally and professionally. - Bemporad R, Baranowski M. Conscious Consumers Are Changing the Rules of Marketing. Are You Ready? Highlights from the BBMG Conscious Consumer Report. Available at:?fmi.org/docs/sustainability/BBMG_ Conscious_Consumer_ White_Paper.pdf. Accessed February 18, 2014. - Natural Marketing Institute. Understanding The LOHAS Market Report. Available at: andeeknutson.com/studies/LOHAS/General% 20Health%20and%20 Wellness/11_LOHAS_Whole_Foods_Version.pdf. Accessed February 18, 2014. - US Environmental Protection Agency. Compact Fluorescent Light Bulbs. Available at: 2.epa.gov/cfl. Accessed February 18, 2014. - Farahani A, Suchak M. Eco-Friendly Dentistry. Available at: c.ymcdn.com/sites/ www.ecodentistry.org/resource/resmgr/docs/eco-friendly_dentistry_jcda.pdf. Accessed February 18, 2014. - Healthcare Environmental Resource Center. Pollution Prevention and Compliance Assistance Information for the Healthcare Industry. Available at: hercenter.org/wastereduction/dentalwastes.cfm. Accessed February 18, 2014. - National Geographic. 2012 Greendex Map of the World. Available at: environ-ment.nationalgeographic.com/environment/greendex. Accessed February 18, 2014. From Dimensions of Dental Hygiene. March 2014;12(3):23–24,26.
<urn:uuid:010b052d-64d4-4707-8e1f-66f91f73190d>
CC-MAIN-2022-33
https://dimensionsofdentalhygiene.com/article/sustainability-challenge/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.908523
1,476
3.25
3
HONDURAS: A MIXED MIGRATION HUB Honduras can be a country of origin, transit and return for children. While it is hard to know exactly how many children from Honduras emigrate or leave the country each year, what is known is that tens of thousands of Honduran children are being detained in other countries in the region, such as Mexico and the United States. Geographically, Honduras is a gateway to the Americas and a key route for children traveling north. Children and adolescents in transit are at risk of becoming victims of violence, trafficking, and extortion and are often deprived of their liberty in places of immigration detention. The Office for Migrant Children of the Honduran Institute for Children and Family (IHNFA) is in charge of receiving unaccompanied migrant children who are not from Honduras. These children are sent to the child migrant shelter (known as “La Misericordia de Dios”), where they are attended to as they await their probable deportation to their home country. They are not allowed to leave the shelter and live deprived of their freedom, often in poor conditions. It is uncertain whether or not they receive legal support or are assigned a guardian to help them protect their rights and ensure that each decision made is in their best interest. MANY CHILDREN ARE BEING FORCED OUT OF HONDURAS Almost a third of the total population of Honduras are children – 2,661,272 persons. However, most of them live in an environment with little access to education or health services and they are highly vulnerable to different forms of violence, trafficking, extortion and recruitment into organized crime. Honduras is the country with the highest rate of homicides worldwide, reflecting the growing power of gangs and organized crime groups, as well as the strong presence of human and drug trafficking networks. Each month, approximately 80 people under the age of 23 are killed. Children leave their countries for multiple and numerous reasons, including abuse, violence, poverty, neglect, health, a lack of educational opportunities and the disintegration or separation from their families. However, most children who leave Honduras and other countries of the Northern Triangle are fleeing increasing violence and instability in their home country. Migrating via informal channels has become their only way out. Some children leave the country accompanied by their parents while others travel alone, yet all seek safety in other countries where they can live without fear. States in the region have been increasing arrests and deportations Instead of finding countries that receive them to provide support and protection, children in Honduras, along with other migrant children, have been put behind bars for not having the correct documents. More than 18,000 unaccompanied children and adolescents from Honduras , were arrested in the US in 2014; and in the same year in Mexico, nearly 9,700 Honduran children were arrested and forced to return home. The US government used more than 3,500 new spaces in detention centers for Central American migrant families; while Mexico increased and strengthened migration controls on the southern border, placing an emphasis on the detention and return of children and adolescents from Central America, arguing that this was for their own protection. International law has been clear that detention is never in the best interests of a child. Some Honduran children who have migrated are returned or deported to Honduras. Each year, Honduras receives thousands of children and young migrants who have been deported from other countries. Arriving in Honduras, most of these children do not have adequate support for their reintegration and safety. Thus, many fall victim to violations of their rights ad may be forced to migrate again. Each year, Honduras receives thousands of children and young migrants who have been deported from other countries. Arriving in Honduras, most of these children and adolescents do not have adequate support for their reintegration or safety. Modificada de Hipsman, F. & Meissner, D. (2015) In Country Processing in Central America: A Piece of the Puzzle (Figura 1, p. 3). Deported childhood and received by the Honduran Institute for Children and Families, per year. JANUARY 2012 – OCTOBER 2014 Children and adolescents may be Hondurans arrested in their own country A disturbing initiative of the Honduran government to prevent children and adolescents from leaving the country was to militarize control along the border between Honduras and Guatemala. Operating under misleading names like “Rescue Angels” elite groups of the National Police and the Armed Forces of Honduras were placed along the border to stop children and adolescents traveling without their parents and destined for Mexico or the United States. When apprehended , these children and adolescents were sent to the Honduran Institute for Children and the Family (IHNFA) to try to locate family members. However, many end up being returned to the same contexts of violence and despair of those who fled before, and later try to leave again, this time taking more hazardous and clandestine routes to avoid authorities.
<urn:uuid:f61f95a1-f8b5-4dc6-bcb1-f95c68619ed5>
CC-MAIN-2022-33
https://endchilddetention.org/essential_grid/honduras-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.963117
1,019
3.125
3
Each year 30,000 graduates enrol onto initial teacher training programs. While these new entrants make an important contribution to the profession, according to the DfE’s Teacher Supply Model (TSM), there are simply not enough of them going into teaching to meet current and future needs. The recruitment shortfall currently stands at almost 3,000 places, increasing year on year. Surge of Graduates into Teaching In June, the Education Policy Institute published a forecast of the likely impact of Covid-19 on the recruitment of graduates into teacher training programmes. Based on evidence from the 2008 financial crisis we predicted that Covid-19 will reduce teacher shortages by between 20 and 40 per cent over the next two years. However, the latest data from UCAS suggests that Covid-19 has caused an unprecedented surge that could close the recruitment gap entirely for the first time since 2012. Since the start of the lockdown 21,410 graduates have applied to teacher training programmes. This is up 8,400, or 65 per cent, from the five-year average. If this trend continues, we would expect Covid-19 to have brought in almost 11,000 additional applicants by the time this application round finishes in September. In recent years 65 per cent of applicants were successfully placed onto teacher training programmes, therefore we would expect the boost in applicants (11,000) to more than fill the shortfall experienced against recruitment targets for last year’s intake (3,000). However, Covid-19 has reduced teacher turnover and left many training providers unable to find placements for their students. If this is not rectified many of the excellent young graduates who are drawn into teaching due to Covid-19 might be lost. Why we see this unprecedented surge The unprecedented surge in teacher numbers is likely down to a combination of the severity of Covid-19’s impact on young people’s employment opportunities (1 in 3 people aged 16 to 24 became unemployed, or furloughed, since the start of lockdown) and it coinciding with a large rise in teachers starting salaries (set to increase to £30,000 by 2022, a rise of 24 per cent). But we must remain cautious Although overall recruitment targets could be met for the first time since 2012, subject-specific shortages could persist. In England, subject specific targets in biology, history, English and physical education have been met in recent years, while targets for physics, and design and technology, have been missed by over 50 per cent. The monthly UCAS data releases do not allow us to differentiate applications by subject so we will have to wait until data for this round is released, which has data on enrolment by subject, in November to see if the boost has reduced subject-specific shortages. In addition international evidence suggests that teachers drawn into the profession during a recession are more likely to quit when other opportunities become available again. Consequently, the boost in teacher numbers could fade over time. The latest data shows that the teaching profession has become more representative in England. 16.2 per cent of secondary school teachers (up from 13.1 per cent in 2010) and 10.6 per cent of primary school teachers (up from 8.5 per cent in 2010) are from ethnic minority backgrounds compared to 16 per cent of the population. However, the boost in diversity has not been shared across all dimensions. 35.5 per cent of secondary school teachers (down from 37.7 per cent in 2010) and 14.1 per cent of teacher in primary schools (up from 12.7 per cent in 2010 but unchanged since 2016) are male compared to 49 per cent of the population. The example of what happened after the financial crisis provides a cautionary tale for teacher diversity: teachers drawn into the profession during the recession were predominately female graduates and white graduates, resulting in a decline in the diversity of new teachers. Looking at the latest UCAS data we see that the boost in teacher applications is primarily driven by women (5,700 more, up 70 per cent) rather than men (2,600 more, up 56 per cent). The Covid-19 boost in teacher training applicants could result in policymakers meeting overall recruitment targets for the first time since 2012. However, we do not know how many of these additional applicants will be placed, the impact it will have on subject specific shortages or the impact it will have on shortages in hard to staff schools. Therefore, as suggested in our previous report, retention incentives – such as £2,000 per year to existing early career teachers in shortage subjects and doubling the extra payments for teaching in challenging areas – could reduce recruitment and retention issues where they remain. In addition, we need to remain cautious over the potential negative implications of the Covid-19 boost on diversity. Especially in primary schools where male teachers and ethnic minority teachers are already underrepresented.
<urn:uuid:8cb83562-ad60-4bd0-8a13-591729d04929>
CC-MAIN-2022-33
https://epi.org.uk/publications-and-research/teacher-recruitment-gap-itt/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.964193
1,004
2.515625
3
Balladeer’s Blog continues its examination of the grand and exciting Hawaiian epic about the goddesses Pele and Hi’iaka. Hi’iaka and the mortal woman Wahine resumed their quest to reach Kaua’i by following the northern coastline of the island of Maui. As they walked they found themselves in a kaha – an area devoid of crops or animal life and in which the residents had to depend on fishing and on deliveries of food from long distances to survive. Wahine was famished and tried begging some food from the inhabitants of the dry, stony area but they all curtly refused. The woman asked her traveling companion Hi’iaka to intercede for her with the recalcitrant villagers. Hi’iaka made the attempt but even her entreaties were rudely rejected. The goddess demanded to know why these people refused to grant any food to strangers traveling through their land. Sensing the latent power in Hi’iaka some of the citizens explained that only their King Olepau (also called Ka’ulahea) could authorize sharing the area’s scanty food supply with non-locals. That king was in a coma and had been for some time while evil sorcerors – two male and two female – battled for control of the sleeping monarch’s spirit body. Control of that spirit body or kino wailua would let whichever sorceror won rule the region by proxy. The king’s kina wailua had slipped away as the four-sided battle between the warring sorcerors continued day and night. Hi’iaka determined to end this nonsense and asked where the sorcerors and the king’s spirit form were generally located. The villagers directed her to the Iao Valley to the south and with Wahine at her side Hi’iaka headed toward that valley, steeled for another battle. In the Iao Valley the two travelers came across the wandering spirit form of King Ka’ulahea (or Olepau). Hi’iaka’s divine eyes enabled her to spot the spirit and she swiftly seized hold of the king’s kino wailua and kept it bound with her supernatural powers. When the goddess and her mortal companion were enroute back to the shoreline with Ka’ulahea’s spirit they were surrounded by the quartet of dueling sorcerors. The sorcerors thanked Hi’iaka for locating the fugitive kino wailua and ordered her to turn it over to them. The goddess refused and a battle royal of various eldritch energies commenced. Wahine sought cover from the stray beams, rays and waves projecting from all directions. When the battle was over a weary Hi’iaka emerged victorious and stripped the sorcerors of all their power, leaving them at the mercy of the people whose king they had been bedeviling. When the sorcerors had been dealt with Hi’iaka still refused to release the king’s spirit form until Wahine had been fed and her thirst quenched. While Wahine was eating and drinking Hi’iaka grew distrustful of the citizens and the spirit form of King Ka’ulahea. Sensing something sinister and unhealthy about them all the goddess decreed it was time for a new king to rule the area. As Wahine finished her repast Hi’iaka made the bound spirit form as solid as an eggshell and smashed it to pieces against a nearby rock, sending Ka’ulahea to the land of the dead for good. Not wishing to slay or injure any of the villagers Hi’iaka grabbed Wahine’s hand and fled the area with her. The late king’s infuriated people pursued them for a long while until Hi’iaka used her divine powers to disguise herself and Wahine as two little girls collecting lehua flowers. Once safely away from the mob hunting them Hi’iaka returned herself and Wahine to their normal appearance and they trudged on, bound for Kailu’a. ++ I’LL CONTINUE THE STORY SOON. CHECK BACK ONCE OR TWICE A WEEK FOR UPDATES. FOR MY LOOK AT THE TOP ELEVEN GODS IN HAWAIIAN MYTHOLOGY CLICK HERE FOR ANOTHER EPIC MYTH CLICK HERE: https://glitternight.com/2013/03/17/iroquois-epic-myth-hodadeion/ FOR SIMILAR ARTICLES AND MORE OF THE TOP LISTS FROM BALLADEER’S BLOG CLICK HERE: https://glitternight.com/top-lists/ © Edward Wozniak and Balladeer’s Blog 2016. Unauthorized use and/or duplication of this material without express and written permission from this blog’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Edward Wozniak and Balladeer’s Blog with appropriate and specific direction to the original content.
<urn:uuid:6e4723d9-989b-4362-b9a4-37e5db2b427d>
CC-MAIN-2022-33
https://glitternight.com/2016/02/24/pele-and-hiiaka-epic-of-hawaii-part-ten/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.953136
1,090
2.765625
3
At about 2 months, your baby may drink about 4–5 ounces (120–150 milliliters) every 3–4 hours. At 4 months, your baby may drink about 4–6 ounces (120-180 milliliters) at each feeding, depending on how often they eat. By 6 months, your baby may drink 6–8 ounces (180–230 milliliters) about 4–5 times a day. How much should a 4 month old eat chart? Breastmilk Feedings and Amounts by Age |Age||# of feedings per day / 24 hours||Average Bottle Sizes (if applicable)| |9-12 weeks/3 months||~8-10||3-4 ounces / 90-120 ml| |13-16 weeks/4 months||~6-10||3-4 ounces / 90-120 ml| |5 months||~6-10||3-4 ounces / 90-120 ml| |6 months||~6-9||4-5 ounces / 120-150 ml| Can a 4 month old eat 6 oz? During the first 2 weeks, babies will eat on average 1 – 2 oz at a time. By the end of the first month they eat about 4 oz at a time. By 2 months, increase to 6 oz per feed, and by 4 months, about 6-8 oz per feed. By 4 months, most babies are drinking about 32 oz in 24 hrs. How much should a 4 month old weigh? Baby weight chart by age |Baby age||Female 50th percentile weight||Male 50th percentile weight| |3 months||12 lb 14 oz (5.8 kg)||14 lb 1 oz (6.4 kg)| |4 months||14 lb 3 oz (6.4 kg)||15 lb 7 oz (7.0 kg)| |5 months||15 lb 3 oz (6.9 kg)||16 lb 9 oz (7.5 kg)| |6 months||16 lb 1 oz (7.3 kg)||17 lb 8 oz (7.9 kg)| What food can I blend for my 4 month old baby? 4 to 6 months old - Pea purée. Share on Pinterest. … - Banana purée. Often called a “perfect” food, bananas are rich in potassium and fiber. … - Baby brown rice cereal. Rice cereal is one of the most common foods to introduce because it’s less allergenic and easily digested. … - Avocado purée. … - Baked sweet potato purée. … - First carrots purée. How many Oz should a 4 month old drink in 24 hours? 4-month-olds will often drink 5 to 7 ounces of formula every four to five hours. That adds up to 24 to 32 ounces of formula in four to six feedings total in a 24-hour period. 5-month-olds will typically drink 6 to 8 ounces of formula around five times per day. How often should a 4 month old eat solids? When your 4 – 6 month old baby is learning to use a cup, giving him a few sips of expressed breastmilk or water (no more than 2 ounces per 24 hours) a couple of times a day is fine and fun. Offer solids once a day, at most. Many start out offering solids every few days or even less often. What age do babies roll over? Babies start rolling over as early as 4 months old. They will rock from side to side, a motion that is the foundation for rolling over. They may also roll over from tummy to back. At 6 months old, babies will typically roll over in both directions. How long should a 4 month old sleep at night without eating? During this time, babies need an average of 14 hours of sleep daily. At 4 months, they can go eight hours at night without feeding; by 5 months, they can sleep for 10 or 11 hours straight. Both 4-month-olds and 5-month-olds will sleep four to five hours during the day, spread out over three naps. What time should 4 month old go to bed? At 4 months, all naps should be ending by 5:00pm with bedtime happening about 2-2.25 hours after the last nap ends. So again, this means that bedtime should not be much later than 7:15pm. 5 months: Babies at this age should be solidly on a 3 nap schedule. How much does a 4 month old sleep? Guidelines from the NSF state that infants (4-11 months old) should get between 12 and 15 hours of sleep per day. AASM and AAP guidelines, which recommend 12-16 total hours, closely track those of the NSF. It is normal for infants to sleep for 3-4 hours during the day. Can I give avocado to my 4 month old? An avocado is smooth and creamy when mashed – a perfect food that will be more readily accepted as baby begins solids. Avocado may be offered as early as 4 – 6 months old. Babies need carbohydrates, and fats as well as proteins for their growth during the crucial first year and even into the second year. Can I give banana to my 4 month old? Bananas may be introduced to your baby as early as 4 months old. Please remember that the recommended age to begin introducing solid foods is between 4-6 months old, with 6 months being the idea age. … As always we recommend you consult with your pediatrician about introducing solid foods to your baby. What baby food should I introduce first? Solid foods may be introduced in any order. However, puréed meats, poultry, beans and iron-fortified cereals are recommended as first foods, especially if your baby has been primarily breastfed, since they provide key nutrients.
<urn:uuid:dcd9affe-d68d-4ec5-9782-e34c42e736f6>
CC-MAIN-2022-33
https://inner-serenity.org/toddlers/how-many-ounces-should-4-month-old-eat-per-feeding.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.930877
1,240
2.53125
3
June 22, 2008 June 22, 2008 June 25, 2008 Educational Research and Methods 13.1016.1 - 13.1016.14 Quantum Dots: Bringing Nanoscience and Engineering into the High School Classroom Abstract This study traces the lesson design process for a professional development initiative on nano- education. In particular, a lesson on quantum dots is traced throughout the iterative design process based on a learning performances framework combined with design-based research. Teacher feedback, pre- and post-tests covering conceptual information, and researcher field notes were used as the primary sources of data. From these data, themes were identified, and actions were taken to address each of these feedback themes to better correspond to the learning goals identified for the lesson. The face of science, engineering, and technology is rapidly changing. The biggest trends are also the smallest, as nano-scale phenomena prove to be more and more important in a wide range of applications. However, we still have yet to include these nano-scale phenomena in our secondary science curricula, leaving students unprepared to enter important careers in nanoscience, engineering, and technology. Professional development efforts are one way to combat this issue. This study focused on curriculum design for a particular professional development program geared towards science teachers in grades 7-12. This professional development program was run through the National Center for Learning and Teaching in Nanoscale Science and Engineering (NCLT) at Purdue University in summer 2007. This was the third year of the program, and another professional development institute will take place in summer 2008. To address the design of lessons for professional development and future classroom use, the researchers used an iterative design process structured around learning goals and performances, basing revisions on teacher feedback and conceptual understanding. This paper will trace the iterative lesson design process, describing teacher feedback, assessments of conceptual understanding, and actions taken to improve the lesson based on this data. Review of Literature Nano-scale phenomena are playing a greater and greater role in every aspect of contemporary scientific research. Nanoscience, engineering, and technology (NSET) have wide-ranging applications in medicine, defense, development of electronics, environmental science, and materials science, to name a few.1-3 It follows from this information that we will need many more workers in the nano-industries; one estimate suggests that the United States will need two million workers in NSET fields in the next decade alone.4 At the same time, the United States is experiencing the need for drastic reforms in science, technology, engineering, and mathematics (STEM) education. U.S. students do not measure up Wischow, E., & Bryan, L., & Daly, S. (2008, June), Quantum Dots: Bringing Nanoscience And Engineering Into The High School Classroom Paper presented at 2008 Annual Conference & Exposition, Pittsburgh, Pennsylvania. 10.18260/1-2--4297 ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2008 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015
<urn:uuid:14908e84-2ced-4119-9efd-db89bd744a8d>
CC-MAIN-2022-33
https://peer.asee.org/quantum-dots-bringing-nanoscience-and-engineering-into-the-high-school-classroom
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.930325
749
2.828125
3
Several core trace types are provided with the Trace geoprocessing tool. Each trace type can be adjusted to refine the results by specifying additional configurations on the Trace tool. Review each trace type below to learn more. For accurate trace results, ensure that the network topology has been validated for the areas of the network that will be traced. Trace results are not guaranteed to be accurate if dirty areas are present. You can determine if dirty areas are present in your network by visual inspection, by using the Validate Consistency parameter in the Trace tool, and by checking the Dirty Area Count option on the Network Topology tab of the Trace Network Properties dialog box. A connected trace begins at one or more starting points and spans outward along connected features. A trace traveling along a path stops when either a barrier is encountered or there are no more connected features (the end of a path). This type of trace is useful for confirming that newly edited features are connected as expected. This type of trace travels the network based only on connectivity. To control the traversability of this type of trace, you must configure the Trace tool manually. Consider an example using the NHDFlowlines feature class from the National Hydrography Dataset; with a network attribute set on the FCode field, you could configure a condition barrier to stop the trace if an artificial path is encountered (FCode = 55800). Output conditions can also be configured to control the results of a trace. For example, to identify connected streams and rivers in the dataset, you could run a connected trace but return only edges with FCodes between 45999 and 46008. A trace configured to control how it travels a network is known as an advanced trace. See Find connected features for more details. Upstream and downstream traces Upstream and downstream directions in a trace network are based on the flow direction set for network edge features. Flow direction is set with the digitized direction of network edges when the trace network is created. Changes to flow direction can be made for a feature class or selected feature using the Set Flow Direction tool. Upstream traces travel upstream, away from starting points placed on edge or point features. To perform an upstream trace, one or more starting points must exist. If a barrier is encountered or there are no more connected or traversable features, the trace stops. Features between the starting points and upstream end locations are returned. If the starting point originates within a loop, trace results return all features in the loop. Downstream traces travel downstream, away from starting points placed on edge or point features. To perform a downstream trace, one or more starting points must exist. If a barrier is encountered or there are no more connected or traversable features, the trace stops. Features between the starting points and downstream end locations are returned. If the starting point originates within a loop, trace results return all features in the loop. Configure the Trace tool parameters to modify an upstream or downstream trace. See Find upstream and downstream features for more details. Shortest path trace Identify the shortest path between two starting points using a trace. The shortest path is calculated using a numeric network attribute such as shape length. Cost- and distance-based paths can both be achieved using this type of trace. To incorporate traversability into this type of trace, the Trace tool parameters can be explicitly set, making it an advanced shortest path trace. Advanced shortest path traces allow you to find the shortest path between two points in a storm water network along channels 54 inches and larger, for example.
<urn:uuid:d06119a8-0725-4f06-97a2-bc2c50736f98>
CC-MAIN-2022-33
https://pro.arcgis.com/en/pro-app/2.6/help/data/trace-network/trace-network-trace-types.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.892708
743
2.875
3
Defining “Digital Humanities” When we study humanities, we study “how people process and document the human experience” (“Digital Humanities,” Stanford Center for the Humanities). The humanities encompass a wide range of fields, such as literature, religion, art, music, history, language, and philosophy. Humanities scholarship helps us to understand and record our world, and encourages us to feel more connected to humans of the past and present. According to Shaw (2012), “The work of the humanities is to create the vessels that store our culture.” Digital humanities add an extra dimension to traditional humanities’ studies. In digital humanities, technology is used to document, process, and explain the human experience. Techniques such as 3-D mapping, digitization, visualization techniques, electronic literary analysis, and online publishing/archives are all common tools of digital humanities. Like “digital citizenship,” no consensus exists as to what “digital humanities” actually means. According to Kirsch (2014), “The term can mean anything from media studies to electronic art, from data mining to edutech, from scholarly editing to anarchic blogging, while inviting code junkies, digital artists, standards wonks, transhumanists, game theorists, free culture advocates, archivists, librarians and edupunks under its capacious canvas.” Clearly, “digital humanities” encompasses a wide range of activities; these activities can primarily be divided into the minimalist approach or the maximalist approach. In the minimalist approach, technology is applied to traditional scholarly pursuits; for example, paper archives are exchanged for digital archives. The maximalist approach is much more extensive and “represents a paradigm shift in the way we think about culture itself, spurring a change not just in the medium of humanistic work but also in its very substance” (Shaw, 2012). The Potential of Digital Humanities By applying technology to the humanities, researchers and scholars are afforded new opportunities. Data collections and online archives allow scholars to interact with source materials in new ways and potentially reach new conclusions. In some ways, digital humanities can be imagined as a new robust form of data management (Shaw, 2012). Similarly, by interacting with data collections and online archives, new knowledge communities and connections among researchers can be formed. For example, digital humanities researchers are mapping Civil War battlefields to better understand how topography and geography influenced victories and defeats. Researchers are creating databases of music to see how collaboration influenced jazz, and they are archiving texts/books to identify when specific scientific concepts first appeared (Cohen, 2010). By introducing digital tools into humanities scholarship, data becomes more accessible and interactive for researchers. As Shaw explains, the “digitization of archives and collections holds the promise of a grand conclusion: nothing less than the unification of the human cultural record online, representing, in theory, an unprecedented democratization of access to human knowledge” (Shaw, 2012). Digital Humanities and Digital Citizenship Digital citizenship explores how we participate in community through technology; digital humanities seeks to use technology to document and process the human experience. In some ways, by maintaining a blog to meet the requirements of ED 654, we are documenting and processing our own human experience (which could loosely be considered an actual application of digital humanities). Similarly, one of the benefits of digital humanities is that it allows researchers to easily collaborate and contribute to each others’ data collections and research. For example, researchers are able to add to online archives and interact with the work of other researchers—even though they have never met. This creation of online knowledge communities bears a strong resemblance to the type of digital online community that is inherent to the concept of digital citizenship. For Further Study on Digital Humanities Digital Humanities. Stanford Humanities Center. Retrieved from http://shc.stanford.edu/digital-humanities The Stanford Humanities Center maintains this informative website that Includes 8 short videos discussing practical applications of digital humanities. For example, one video explains a project that is documenting and mapping the development of post offices in the pioneer American West, because post offices reflect the spread of communities. Another short video explores an application called “Palladio,” which is an analytic tool / “historical viewfinder” that makes it easier for humanities scholars to upload data and produce different forms of data visualizations. Overall, the Stanford Humanities Center argue that digitization has changed how humanities scholars interact with information. Kirsch, A. (2014, May 2). Technology is taking over English departments. New Republic. Retrieved from https://newrepublic.com/article/117428/limits-digital-humanities-adam-kirsch This extensive article critiques the impact and value of digital humanities. The author claims that the move towards digital humanities reflects technological determinism, as, “right before our eyes, options are foreclosed and demands enforced; a future is constructed as though it were being discovered.” The author urges us to be cautious amidst the hype of digital humanities, argues that humanities scholars have an “intellectual responsibility” to not “embrace the momentum of the digital, the tech tsunami, but to resist it and critique it.” Cohen, P. (2010, Nov. 16). Digital keys for unlocking the humanities’ riches. The New York Times. Retrieved from http://www.nytimes.com/2010/11/17/arts/17digital.html?_r=0 Patricia Cohen argues that the next big trend in humanities will center on data and digitalization, but expresses fears that data-driven research may exclude some of the important nuances that are intrinsic to the study of humanities. She argues that humanities is about interpretation and questions of aesthetics and existence—none of which are necessarily quantifiable. The article discusses how “digital media are means and not ends,” but digitalization can lead to new discoveries. In some instances, large amounts of data would have prevented researchers from coming to specific conclusions, but, with digital tools, it becomes possible. Digging into data resources. Digging Into Data Challenge. Retrieved from http://diggingintodata.org/ This is the link to the website for the “Digging into Data Challenge,” which is an extensive project originally sponsored by the U.S. National Endowment for the Humanities, the U.S. National Science Foundation, Canada’s Social Sciences and Humanities Research Council, and the U.K. Joint Information Systems Committee (Jisc). As the project grew, sponsors and projects were added from Netherlands, Argentina, France, Germany, Mexico, Portugal, etc. This particular project addresses how “big data” influences the research environment for social sciences and humanities, and explores how new technologies can be used in research. The link to the “Digging into Data Resources” page is particularly useful for practitioners of digital humanities as it offers a list of major repositories of digital information and explains how to access the collections of data. Kaplan, F. (2013, June). How to build an information time machine. TED Talk. Retrieved from https://www.ted.com/talks/frederic_kaplan_how_i_built_an_information_time_machine?language=en Researcher and engineer Frederic Kaplan explains how research can be enriched by adding a temporal dimension to visual representation. For example, he uses visualizations to create a “digital time machine” that helps his audience understand how Venice has changed over the last 1000 years. This example demonstrates digital humanities in action, and shows how data and visualizations can help us understand historical and geographic changes over time. Shaw, J. (2012, May-June). The humanities, digitized. Harvard Magazine. Retrieved from http://harvardmagazine.com/2012/05/the-humanities-digitized This in-depth article discusses the pedagogical and collaborative impact of digital humanities. In the classroom context, Shaw argues that visualizations are better than videos, since videos are inherently linear. He offers the example of a 23-foot wraparound screen that projects a 3-D virtual world of the Giza Plateau in the year 2566 B.C. He also explains how digital archives can encourage epistemic communities. As you work your way through an archive, you are not just encountering data, you are interacting with the work of fellow archivists, “so in a way, you’re becoming part of a community of archivists whom you may never meet in person, but with whom you’re collaborating.” He closes by arguing that “the changes afoot in the humanities are about expanding the compass, the quality, and the reach of scholarship.” NPR (2014, April 9). New age: Leaving behind everything, or nothing at all. All Things Considered. Retrieved from http://www.npr.org/sections/alltechconsidered/2014/04/09/300614977/the-new-age-leaving-behind-everything-or-nothing-at-all This NPR article briefly discusses the work of archivists at the Maryland Institute for Technology in the Humanities. Primarily, it introduces some of the practical problems that can result from the digitization of data. For example, as technology changes, digital data archives may consist of obsolete technology (like floppy disks). The software and information within digital archives can also start to decay. Consequently, digital archives present different challenges than paper archives. However, digital collections offer precise time stamps which can be useful in building bigger picture of someone’s life, an event, etc.
<urn:uuid:6d46030c-7072-4c3b-a658-1515dcf90cca>
CC-MAIN-2022-33
https://vmw25.net/ed-654/digital-humanities/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.898668
2,024
3.40625
3
(See Below for Case Law, Evidence of Public Attitudes, NGOs that Assist or Advocate on LGBTI issues, and Country of Origin LGBTI Specialists) Homosexuality is illegal in Somalia. Article 409 of the 1964 Penal Code states that homosexuality (same-sex intercourse) is punishable ‘by imprisonment from three months to three years and an act of lust other than sexual intercourse is punishable by imprisonment from two months to two years’. Article 410 provides a security measure that can be applied to crimes that violate Article 409 of the Penal Code. This allows police surveillance to be carried out in order to prevent re- offending. On 1 August 2012 a provisional constitution was adopted by the Federal Republic of Somalia. It asserts Islam to be the religion of the State and as such, all laws must be compliant to Shari’a law. Article 4 states ‘After the Shari’a, the Constitution of the Federal Republic of Somalia is the supreme law of the country’. Islamic Shari’a Law deems homosexual acts punishable by the ‘death penalty or flogging’. Equality is addressed in Article 11(2) of the constitution, ‘The State must not discriminate against any person on the basis of age, race, colour, tribe, ethnicity, culture, dialect, gender, birth, disability, religion, political opinion, occupation, or wealth’. There is no mention of sexual orientation or gender identity. The borders of the Federal Republic of Somalia include the regions of Somaliland and Puntland. Under the new constitution the Government will create Federal Member States, moving away from clan-based regions that formed since the previous Government was ousted in 1991. Those Federal Member States have yet to be decided, however the constitution holds that Member State Governments shall be ‘harmonised’ with the Federal Government creating a unified Somalia. No official case law has been found. PUBLIC ATTITUDES AND/OR STATE’S CAPACITY TO PROTECT The United Nations resolution condemning ‘extrajudicial, summary or arbitrary executions’ calls on States to protect individuals’ right to life in a non discriminatory way. In November 2010, Somalia was one of 79 countries that voted in favour of an amendment to the resolution, removing discrimination based on sexual identity. In 2008, the United Nations Declaration on Sexual Orientation and Gender Identity was passed. The declaration reaffirmed ‘the principle of non-discrimination, which requires that human rights apply equally to every human being regardless of sexual orientation or gender identity’. Somalia was one of 58 States who signed a Counter Statement to this declaration. A member of the community based organisation, Queer Somalia said ‘My people don’t understand what a homosexual is. They only know that through their religious law, the solution is to kill’. Groups working for the protection of LGBTI rights are restricted to the extent that they have no official recognition in Somalia. A report by Asylum Law on 22 February 2001 reported two women who were living together, declaring themselves as man and wife. On 19 February 2001 a court in Bosaso sentenced them to death by stoning for ‘exercising unnatural behaviour’. The media reported that several hundred people turned out to watch the hearing and cheered when the verdict was announced. This case was not officially reported. Homosexuality is rarely discussed in Somalia. This has wider implications in terms of HIV/Aids particularly for ‘at risk’ populations, for example men who have sex with men (MSM). Somalia has refrained from providing information regarding indicators for MSM to the United Nations General Assembly Special Session (UNGASS). NON-GOVERNMENTAL ORGANIZATIONS (NGOs) No records could be found of any NGOs working within Somalia focusing on the rights of LGBTI persons. Readers who have more information on this are encouraged to get in touch with the contact below. COUNTRY OF ORIGIN SPECIALISTS We currently have no Country of Origin Specialists on LGBTI for Somalia, but would welcome suggestions. Researched by: Christina Haneef
<urn:uuid:f896912d-863a-41ab-b749-d94ab4d538ac>
CC-MAIN-2022-33
https://www.amerainternational.org/somalia-lgbti-resources/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.937377
881
2.78125
3
What impeaching leaders looks like around the world President Trump may only be the third American president to be impeached, but a quick look around the world might give him comfort. By the numbers: “Since 1990, at least 132 different heads of state have faced some 272 impeachment proposals in 63 countries,” per the Economist. Most leaders survive most impeachment attempts, as Trump almost certainly will. The history: The roots of impeachment date back to ancient Germany, but the first known instance came in England in 1376 with the removal of ministers to King Edward III, according to the Economist. - “The constitutions of 94% of countries with presidents include mechanisms for removing them from office. Even some countries without presidents, such as Britain, allow for impeachment.” - “Leaders in nearly half of the countries that transitioned to presidential democracy from the mid-1970s onwards faced threats of impeachment from the legislature between 1974 and 2003.” - “Several notable instances of impeachment-related departures include Brazil’s Fernando Collor (1992)... Peru’s Alberto Fujimori (2000)... the Philippines’ Joseph Estrada and Indonesia’s Abdurrahman Wahid (2001) and South Korea’s Park Geun-hye (2017).” The criteria vary: “In Tanzania, the president can be impeached if he has ‘conducted himself in a manner which lowers the esteem of the office of president.’ Honduran presidents can be impeached for incompetence. In Ghana, disrepute, ridicule or contempt of office suffice.” So do the procedures. In most countries, the final verdict comes from a court or constitutional council. - Removal from office also triggers fresh elections in most countries, rather than a transition to the vice president.
<urn:uuid:33f505ff-3f97-4108-9f70-6bd7d77c9282>
CC-MAIN-2022-33
https://www.axios.com/2019/12/19/impeachment-other-countries
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.933679
379
3.0625
3
Types of Developmental Milestones in Children We should monitor our children while growing. We need to be with them every step of the way guiding them making sure our child is progressing appropriately and teaching them things that parents should be teaching. And of course, as parents, we need to understand how important developmental milestones are. Listed below are types of developmental milestones in children: - Physical milestones. This is where the child develops large motor skills and fine motor skills which they can sit, stand up, crawl, and walk. - Cognitive milestones. This involves the ability of a child to think, learn, and solve problems. This is where a Child Development Center can provide great help to our little ones. - Social and emotional milestones. This is where children gain a better understanding of their own emotions and can grasp the emotions of the people surrounding them. - Communication milestones. This is the stage where children learn both language and nonverbal communication. This is the time also when they will learn some basic rules of grammar. If you are looking for a reliable provider of Childcare Services in South Carolina, then we are the ones you are looking for! We at Creative Beginnings, a Day Care in Myrtle Beach, South Carolina, always believe in the next generation and in what they can do to our world, therefore, we are dedicated to providing quality childcare services. We would love to partner with you in nurturing young minds and maximizing their potentials to set them up for lifetime success. If you have further questions about our company, please feel free to reach us.
<urn:uuid:18a75969-377b-434f-97bb-dc5f70eb1ad8>
CC-MAIN-2022-33
https://www.creativebeginningscdc.com/types-of-developmental-milestones-in-children
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.944535
327
3.109375
3
There are a lot of reasons to consider earning a master’s degree in computer science, one of the highest-paying master’s degrees, including lucrative earning potential and plentiful job opportunities in a variety of industries. However, one reason prospective students may shy away from this field is its reputation for being a difficult subject. This reputation isn’t undeserved, since in many ways, computer science is difficult. That said, students who take the time to build up their related skills and have the discipline to learn the principles and practices of programming without getting discouraged are likely to find that the challenges of studying computer science are worth undertaking. Why Computer Science Is a Hard Field to Learn There are a few factors that make computer science a hard field of study to learn. For one thing, computer science is closely related to math. Many of the foundations of computer science are mathematical in nature. Since mathematics is widely considered one of the most difficult subjects, it stands to reason that this reputation for difficulty would extend to math-related fields like computer science. Although you don’t necessarily need to be a math whiz at complex calculations to do well in computer science, you need to at least be average in your math skills and to work to cultivate skills in mathematical thinking. It’s this thinking that helps you learn one of the most challenging computer science skills, which is computer programming. Like math, computer science is constructive, which means each new course and topic builds upon prior studies in the field. If you fail to master one aspect of coursework, it may hinder your ability to master the next computer science topic you encounter in your studies. Learning Skills in Computer Science – Like All Subjects – Takes Time IMAGE SOURCE: Pixabay, public domain Don’t let the challenging nature of the field deter you from pursuing a career in computer science if that’s really what you want to do. There’s no question that most people find the theoretical underpinnings and the programming skills that are involved in computer science to be difficult. However, that’s true for the most complex aspects of just about any subject. A huge part of succeeding in a computer science degree program is recognizing that it takes time to master these difficult skills and areas of knowledge. Programming isn’t a skill that comes naturally or easily to many people, so if you haven’t been exposed to it before, there’s a good chance that you will struggle to pick it up at first. If you’re worried about computer science being too difficult a program of study, consider testing the waters by taking an introductory programming course or two. You can also start to build your programming knowledge in less formal ways, such as reading introductory books on coding, watching video tutorials and playing educational games designed to teach the basics of programming. You can also help yourself succeed by building up other relevant skill sets. Problem-solving is an integral skill for computer science professionals, and there are many ways you can develop these abilities outside the classroom, often through fun activities like escape rooms, puzzles, riddles and strategy games. Similarly, you can work on developing your analytical skills and your logical and rational thinking processes. Learning to program computer software and applications requires you to take a logical approach and follow the syntax rules that apply in the computer programming language you’re using. Finally, go into your graduate education with realistic expectations. Realize that your coursework isn’t going to be easy, and plan to devote plenty of time to your studies. Understand that you’re not just memorizing information to pass a test but rather building a set of complex skills. Most challenging skills, from playing musical instruments to the practice of medicine, take time, patience, experience and discipline to learn. Computer science skills like programming are no exception, so don’t get discouraged if you struggle at first. The longer you wait to recognize that you’re struggling in computer science studies, the harder it is to catch up again. Don’t be afraid to ask your instructor for assistance if you are falling behind or to find a tutor who will provide you with extra help on a regular basis.
<urn:uuid:235164ca-c145-4725-b1b3-7ac92a429b53>
CC-MAIN-2022-33
https://www.degreequery.com/computer-science-degrees/is-computer-science-more-difficult-than-other-fields/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.948015
865
2.5625
3
The roots of cassava (Manihot esculenta) serve as the primary source of carbohydrates in the diets of people in many arid regions of the world, including more than 250 million people in sub-Saharan Africa. Unfortunately the roots of commercial cassava cultivars are quite low in micronutrients, and micronutrient deficiencies are widespread in these regions. In addition to programs designed to deliver vitamin supplements, there has been considerable effort aimed at biofortification; that is, increasing the amounts of available micronutrients in staple crops such as cassava. An article published in The Plant Cell this week describes the results of a collaborative effort led by Professor Peter Beyer from Freiberg University in Germany, together with researchers at the International Center for Tropical Agriculture (CIAT) in Colombia. These researchers studied a naturally arising variant of cassava with yellow roots in order to understand the synthesis of provitamin A carotenoids, dietary precursors of vitamin A. Beyer was also co-creator of Golden Rice, a biofortified crop which provides precursors of vitamin A not usually present in the rice that people eat. In this work, the scientists compared different cassava cultivars with white, cream, or yellow roots – more yellow corresponding to more carotenoids – in order to determine the underlying causes of the higher carotenoid levels found in the rare yellow-rooted cassava cultivar. They tracked the difference down to a single amino acid change in the enzyme phytoene synthase, which functions in the biochemical pathway that produces carotenoids. The authors went on to show that the analogous change in phytoene synthases from other species also results in increased carotenoid synthesis, suggesting that the research could have relevance to a number of different crop plants. Furthermore, they were able to turn a white-rooted cassava cultivar into a yellow-rooted plant that accumulates beta-carotene (provitamin A) using a transgenic approach that increased the enzyme phytoene synthase in the root. This work beautifully combines genetics with biochemistry and molecular biology to deepen our understanding of carotenoid biosynthesis. "It paves the way for using transgenic or conventional breeding methods to generate commercial cassava cultivars containing high levels of provitamin A carotenoids, by the exchange of a single amino acid already present in cassava" says Beyer. Thus, it has the potential be a big step the battle against vitamin A deficiency, which is estimated to affect approximately one third of the world's preschool age children. This research was supported by the HarvestPlus research consortium, which received a grant from the Bill & Melinda Gates Foundation. The research paper cited in this report is available at the following link: Welsh et al. Plant Cell Full citation: Welsch, R., Arango, J., Bär, C., Salazar, B., Al-Babili, S., Beltrán, J., Chavarriaga, P., Ceballos, H., Tohme, J., and Beyer, P. (2010). Provitamin A accumulation in cassava (Manihot esculenta) roots driven by a single nucleotide polymorphism in a phytoene synthase gene. Plant Cell 10.1105/tpc.110.077560. The Plant Cell (http://www.plantcell.org/) is published by the American Society of Plant Biologists, a professional scientific society, headquartered in Rockville, Maryland, that is devoted to the advancement of the plant sciences worldwide. With a membership of nearly 5,000 plant biologists from throughout the United States and more than 50 other nations, the society publishes two of the world's more influential plant science research journals: The Plant Cell and Plant Physiology. For more information about ASPB, please visit http://www.aspb.org/. Figure credit: International Center for Tropical Agriculture (CIAT) Restrictions: Use for noncommercial, educational purposes is granted without written permission. Please include a citation and acknowledge ASPB as copyright holder. For all other uses, contact firstname.lastname@example.org. The Plant Cell
<urn:uuid:ced19412-7585-47c9-92c7-9a436a8f1496>
CC-MAIN-2022-33
https://www.eurekalert.org/news-releases/846674
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.918369
877
3.71875
4
CAPE CANAVERAL, Fla. — A NASA spacecraft has landed on Mars to explore the planet's interior. For the first time in six years, a new mission is about to land on Mars. On November 26, NASA's Mars InSight lander will touch down on the Red Planet. Flight controllers announced that the spacecraft InSight touched down Monday, after a perilous supersonic descent through the red Martian skies. Confirmation came via radio signals that took more than eight minutes to cross the nearly 100 million miles (160 million kilometers) between Mars and Earth. There was no immediate word on whether the lander was in good working order. NASA satellites around Mars will provide updates. It is NASA's eighth successful Mars landing since the 1976 Vikings. The thee-legged, one-armed InSight will operate from the same spot for the next two years. It landed less than 400 miles (600 kilometers) from NASA's Curiosity rover, which until Monday was the youngest working robot in town.
<urn:uuid:62092e7c-730d-4ec2-9457-302941526999>
CC-MAIN-2022-33
https://www.fox6now.com/news/nasa-insight-spacecraft-lands-on-mars-to-dig-deep
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.937984
208
3.078125
3
By Rob James Social media has become an essential part of most people’s everyday lives, from checking Facebook and Twitter to posting blogs, Pinterest listings, and uploading YouTube videos. However, and with smartphones making it easier than ever to spend time on social media networks, in what ways can these networks be leveraged to engage and build a foundation for future student learning? While the potential of distraction is there, the right social media teaching strategies can lead to creative learning, and a productive approach to making social media part of ongoing professional development. There is already evidence that teachers are using social media as part of teaching strategies, with the aim of encouraging students to view social networks as less of a pleasurable distraction, and more as something that can be used in projects and for personal expression in a medium they prefer. Steven Anderson has recently proposed a comprehensive set of general approaches to integrating social media into the classroom, and focuses on the need to carefully review existing teaching strategies and understandings of social media before making changes. Some possible strategies for teachers to use social media have been outlined by Adam Renfro who emphasizes the cost effectiveness of using free social networks and the value of incorporating “real-world experiences into your classroom,” as well as the ability to encourage collaboration between students. Renfro notes several examples of where different social networks can be combined, from a specialized Twitter account for students to post comments on class projects and news stories using hashtags to creating a class Facebook page. In addition, Renfro points to YouTube as a way to both create new teaching material, and to spread videos across different social networking sites. For students, social networks arguably provide a mix of creative expression and group work through tasks like contributing to a blog, designing websites, uploading video presentations, and creating Facebook pages for class projects. Katie Lepi has offered a range of recent examples of successful social media in practice, from a high school using Twitter to communicate with their principal, to another school that has built an alumni database, through to a middle school in the U.S. that uses blogs, whiteboard, and texting, while employing apps to monitor late arrivals. Perhaps the key benefit emphasized across studies of social media in schools is the way that using these networks provides creativity and real-world experience. Students that use social media from an early age learn to view it as more than just a distraction, and as something that they use to learn and produce content in a setting that they are familiar with and challenged by. In 2010, Sarah Kessler made a strong argument for schools using social media with students from a young age, suggesting that schools that ban it end up failing to encourage responsibility and understanding of its positives. Kessler also argues that students become more engaged through producing online content read by more than just a teacher. In this way, Kessler argues that gaining online collaboration and networking skills can feed into future employability, where students have experience of working together on projects. It’s important, then, to view social media as something that is not going away, and that should be used productively, rather than devalued in schools. Doing so can mean that students moving into the workplace know how to use social media as an important tool, rather than a distraction. Indeed, Jack Wallen suggests that social networking in work can actually boost productivity through business pages, Twitter feeds, and LinkedIn profiles that allow workers to stay in touch with professional networks. As a result, it’s important that schools find ways to integrate social media into and beyond the classroom to build future professional skills. Rob James, a secondary school teacher in the UK, found his job by looking through GSL Education’s teaching jobs in London. Over the years he has had many different roles. Rob likes to blog about the different aspects of inspiring young minds. References and Further Reading - Anderson, Steven. ‘How to Create Social Media Guidelines for Your School.’ Edutopia. 7 May 2012. http://www.edutopia.org/how-to-create-social-media-guidelines-school. Last Accessed: 20 Nov 2012. - Kessler, Sarah. ‘The Case For Social Media in Schools.’ Mashable. 29 Sep 2010. http://mashable.com/2010/09/29/social-media-in-school/. Last Accessed: 20 Nov 2012. - Lepi, Katie. ’10 Real-World Ways Schools Are Using Social Media.’ Edudemic. 9 Oct 2012. http://edudemic.com/2012/10/10-real-world-ways-schools-social-media/. Last Accessed: 20 Nov 2012. - Renfro, Adam. ‘8 Social Media Strategies for Your Classroom.’ Getting Smart. 22 Dec 2011. https://www.gettingsmart.com/blog/2011/12/developing-a-social-media-strategy-for-your-classroom/. Last Accessed: 20 Nov 2012. - Wallen, Jack. ’10 reasons NOT to block social networking at work.’ Tech Republic. 27 Mar 2012. http://www.techrepublic.com/blog/10things/10-reasons-not-to-block-social-networking-at-work/3140. Last Accessed: 20 Nov 2012.
<urn:uuid:d8e034a4-956b-4e6d-a4ac-9204de140ec5>
CC-MAIN-2022-33
https://www.gettingsmart.com/2012/11/26/engaging-students-through-social-media-real-world-experience-creativity-future-employability/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.933667
1,101
3.3125
3
Atticciato appears in Emilia’s fourth tale (IV, 7), as a friend of Pasquino and Stramba. His name means “Potbelly,” contributing to the tale’s seedy atmosphere. Along with Stramba and Malagevole, he agitates for Simona’s execution, believing that she murdered Pasquino. But when her accidental death proves her innocence, he joins with his friends and Guccio Imbratta to make sure the lovers receive a proper burial. Atticciato Character Timeline in The Decameron The timeline below shows where the character Atticciato appears in The Decameron. The colored dots and icons indicate which themes are associated with that appearance. Day 4: Seventh Tale ...bush, beneath which they discover a toad whose foul breath has poisoned the leaves. Stramba, Atticciato, Guccio Imbratta, and Malagevole bury Pasquino and Simona in their local church. (full context)
<urn:uuid:2f39f5da-1128-47d8-be45-cf4181eb18f0>
CC-MAIN-2022-33
https://www.litcharts.com/lit/the-decameron/characters/atticciato
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.921129
218
2.8125
3
Hotham is iconic for several reasons - its unique terrain, world class snow and the fact that it is home to the Mountain Pygmy-possum. Australia's only hibernating marsupial, the Mountain Pygmy-possum was thought to be extinct until it was rediscovered at Hotham during the 1960s. Since than there has been ongoing work to ensure the critically endangered Mountain Pygmy-possums continues to survive. The ‘Tunnel of Love’ has played a big part in this allowing male Mountain Pygmy-possums, who live down lower, a safe passage to cross the Great Alpine Road to breed with females who enjoy a habitat at higher altitude. Another aspect key to the survival of the Mountain Pygmy-possum is their food source the Bogong Moth, and this is where Zoos Victoria have focused a recently launched awareness campaign. Commencing on September 1 and running through to October 31, Zoos Victoria has called on everyday people and those working in high profile public buildings to turn off non-essential outside lights to assist Bogong Moths on their migration to alpine areas. Along with light pollution, Bogong moth numbers have already been severely impacted by several issues including climate change and droughts in their breeding grounds of southern Queensland, northern and central NSW, Victoria and South Australia. Additionally, people can also contribute important information about Bogong Moth numbers and migration patterns through Zoos Victoria’s online Moth Tracker that can be found by going to www.swifft.net.au/mothtracker. Zoos Victoria says awareness and data is essential to ensure that Bogong Moths have the best chance of successfully migrating to Mountain Pygmy-possum habitat. Mount Hotham Alpine Resort Management Board is supporting the Zoos Victoria campaign. “As the land manager we have a responsibility to preserve our alpine environment and the threatened species that live in it so we’re happy to see any bit of awareness for Mountain Pygmy-possums,” MHARMB Environmental Manger, Georgina Boardman said. Georgina said each summer sees monitoring of Mountain-Pygmy-possum numbers however, the upcoming green season will include additional and supplementary monitoring. “Summer is our chance to check in on the Mountain-Pygmy-possums and look into the amount of litter loss, if any, that might occur.” Zoos Victoria has also committed to continue to put the Mountain Pygmy Possum up in lights over the coming months which is great news for our furry little friends living in the boulder fields across the resort. Have you signed up for our weekly Hotham Herald?
<urn:uuid:aad558de-fc1e-4fd5-9f81-b154a3e947ec>
CC-MAIN-2022-33
https://www.mthotham.com.au/discover/connect-with-us/latest-news/2019/mpp-awareness
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00288.warc.gz
en
0.958787
581
3.140625
3
School Helps Children Open Their Ears THIS STORY HAS A VIDEO CLICK HERE TO SEE IT Memphis, Tn - Just days away from her pre-school graduation Autumn Hankins is beside herself with excitement. She's on the verge of tears, "Momma's gonna cry too." Happy tears as Autumn calls them. The Hankins have been on an emotional journey. Doctor's say the newborn suffered profound hearing loss at birth. "She failed the hearing screening in the hospital three times," says her mom, Crystal. She goes on to say, "I caught the flu while I was actually in labor with her. That is the medical reason they have as to why she is hearing impaired." The diagnosis was overwhelming and intimidating. Autumn spent the first six months of her life undergoing tests while the family adapted. "We did take some sign language classes because originally that's how we did start language with her. She was a little bitty baby doing baby signs, so that's how she would communicate with her," says Crystal. Doctors worked hard to help her hear. The first attempt was hearing aids, but the devices didn't make much of a difference. Surgery at LeBonheur Children's Hospital would prove to give her the sound she never had. She received her first cochlear implants when she was a year old. From there, the family was referred to the Memphis Oral School for the Deaf, a place that prides itself on empowering deaf children to listen, learn and talk. Executive Director Teresa Schwartz explains the technology, "The cochlear device consists of two main components, a sound processor and transmitter worn around the ear, and a receiver implanted underneath the skin with cords attached to nerves in the inner ear. A magnet connects the external components with the implant. The receiver sends currents to the ear, creating a sense of sound." Autumn has perhaps the best explanation, "Like you have them in now, when you take them off, what's the difference? Like I can't hear, watch. So when I'm talking now, you can't hear what I'm saying? What?" Autumn says she takes "her ears", as mom and dad call them, off at bath time and bedtime. E Early on, autumn wondered why. Crystal explains, "She wants to know why she has cochlear implants and everybody else doesn't. That's probably more of her bigger question, so we just explain to her, God made you special." Schwartz says one in every three hundred and thirty three children are born with some level of hearing loss. Recent studies show kids who have the implants before they are two, learn faster and better. This Germantown based school helps with both of those, developing listening skills and language skills so they can communicate without having to rely on sign language. Before graduating, every student here will be able to talk. To make that a reality, every day, each student has 30 minutes of speech therapy, and 30 minutes of aural habilitation, which is listening therapy. For autumn, it's made a world of difference in the 4 years she's been in the program. Her mom is overjoyed, "They've changed her life in the sense that now she can just move on, and go to a public school, and not be in a special education program." Not only is she talking, she also plays the violin. Her success story is more than the Hankins family ever imagined. Now she's days away from completing the program at the oral school. A milestone that's miraculous, in a way. Getting to graduation has been a long road, and now it's bittersweet for this 6 year old, bubbling over with personality. on Friday, after 4 years of highs and lows, Autumn will end one chapter in her life, and begin anew, never forgetting the school that helped her hear, talk, and develop in ways her mother never imagined.
<urn:uuid:d9f1fc4c-29a4-455f-be61-359a0874b4dc>
CC-MAIN-2022-33
http://blog.deafadvocacy.org/2010/05/school-helps-children-open-their-ears.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573630.12/warc/CC-MAIN-20220819070211-20220819100211-00288.warc.gz
en
0.979887
814
2.65625
3
Also found in: Dictionary, Thesaurus, Medical, Wikipedia. (termites), an order of insects, closely related to the Blattoidea (cockroaches) and Mantodea (mantises), characterized by incomplete (gradual) metamorphosis and a social organization that shows a marked diversity of individuals within a species (sexual and caste polymorphism). Isoptera live in nests in colonies of several hundred to several million individuals. The colony consists of a female and a male (the royal pair) or the neoteinic reproductives that replace them and of large and small soldiers and workers—males and females with reduced reproductive glands. In lower Isoptera, true workers are replaced by nymphs. Some Isoptera have no soldier caste. The workers are 2–15 mm in length, and the soldiers up to 20 mm; egg-laying females with hypertrophied ovaries reach 140 mm in length. Adult reproductives have two pairs of elongated, delicate, membranous wings, which they shed after flight, and compound eyes. In other castes, the eyes are underdeveloped or absent. Symbiotic protozoans—flagellates of the order Hyper-mastigina—develop in the intestines of Isoptera; they enable Isoptera to digest the cellulose that represents the principal source of food for the majority of species. Some Isoptera feed only on fungi, chiefly molds, which they raise in fungus gardens. A colony centers on the royal pair. After rearing the first workers, the female is periodically refertilized by the male and thereafter only lays eggs. The life-span of the royal pair ranges to several decades; the colony, however, may exist for many decades. Workers provide the colony with food and build the nest and galleries. Isoptera in a single colony constantly exchange food (tro-phallaxis). The development of castes in Isoptera is associated with the division into reproductive and sterile individuals, as well as into workers and soldiers. The insects’ way of life is usually hidden from man. The nests are diverse in shape and size; some tropical species build nests 15 m high. Several species have subterranean nests; others eat out the interior of wood. Isoptera actively regulate the microclimate of the nest. Many invertebrates (termitophiles) are symbionts of Isoptera in the nests; they include coleóptera, oniscoideans, myriapods, and acarians. There are approximately 2,600 species of Isoptera, grouped in six families. They are chiefly distributed in the tropics and partly in the subtropics. There are seven species in four families in the USSR—in the southwestern Ukrainian SSR, on the coast of the Black Sea in the Caucasus, in Middle Asia, and in the Far East. Isoptera destroy wood and other materials; in Africa and India they damage crops. There is a constant struggle to control harmful Isoptera. REFERENCESLuppova, A. N. “Termity Turkmenistana.” Tr. ln-ta zoologii i parazitologii (AN Turkm. SSR), 1958, issue 2. Zhizri zhivotnykh, vol. 3. Moscow, 1969. Pages 204–10. Grassé, P. P. “Ordre des isoptères au termites.” In Traité de zoologie, vol. 9. Paris, 1949. Goetsch, W. Vergleichende Biologie der Insecten-Staaten. Leipzig, 1953. Harris, W. Termites, Their Recognition and Control. London, 1961. A. A. ZAKHAROV
<urn:uuid:068747c1-d9c7-4e7b-b557-81f680b77bd0>
CC-MAIN-2022-33
https://encyclopedia2.thefreedictionary.com/Isoptera
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573630.12/warc/CC-MAIN-20220819070211-20220819100211-00288.warc.gz
en
0.873938
829
3.65625
4
The Hortus Sanitatis (also written Ortus, Latin for The Garden of Health), was the first natural history encyclopedia, published by Jacob Meydenbach in Mainz, Germany in 1491. It describes species in the natural world together with their medicinal uses and modes of preparation. It is in part an extended Latin translation of the German Herbarius, the Gart der Gesundheit of Peter Schöffer, published in 1485, but unlike that earlier work also deals with animals, birds, fish and stones. The author does not restrict himself to dealing only with real creatures, but also includes accounts of mythical animals such as the dragon, harpy, hydra, myrmecoleonUsually considered to be a mythical creature of legend, it has also been identified as a rock hyrax. , phoenix, and zitironA mythological creature with an upper body in the form of an armed knight, fused with the tail of a fish. . A second edition of the Hortus Sanitatis was published in 1491 and a third in 1497. A French edition by Antoine Vérard was printed in Paris in about 1500, under the title Ortus sanitatis translate de latin en francois. The last complete copy of Hortus Sanitatis appeared in about 1539, printed by Phillipe le Noir and sold in Paris under the title of Le jardin de sante. An English version of extracts from the Hortus, the Noble lyfe & natures of man, of bestes, serpentys, fowles & fisshes, was produced in 1491 by Laurence Andrew (fl. 1510–1537). A facsimile edition was published in London in 1954 by B. Quaritch. The book is divided up into sections as follows: - Tractatus De Herbis (“Treatise on Herbs”) - Tractatus De Animalibus (“Treatise on Animals”) - Tractatus De Avibus (“Treatise on Birds”) - Tractatus De Piscibus (“Treatise on Fish”) - Tractatus De Lapidibus (“Treatise on Stones”) - Tractatus De Urinis (“Treatise on Urine”) - Tabula super tractatu (an alphabetic index of medicinal uses for the species in each section) - Tabula Generis (an alphabetic list of the included species)
<urn:uuid:5e33d531-768c-459a-9935-088c531d6d1f>
CC-MAIN-2022-33
https://engole.info/hortus-sanitatis/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573630.12/warc/CC-MAIN-20220819070211-20220819100211-00288.warc.gz
en
0.905068
551
3
3